Sourcecodester Payroll Management System v1.0 is vulnerable to File Upload. Users can upload images via the "save_settings" page. An unauthenticated attacker can leverage this functionality to upload a malicious PHP file instead. Successful exploitation of this vulnerability results in the ability to execute arbitrary code as the user running the web server.
References
Link | Resource |
---|---|
https://github.com/ShellUnease/payroll-management-system-rce | Exploit Third Party Advisory |
https://packetstormsecurity.com/files/179106/Payroll-Management-System-1.0-Remote-Code-Execution.html | Exploit |
https://github.com/ShellUnease/payroll-management-system-rce | Exploit Third Party Advisory |
https://packetstormsecurity.com/files/179106/Payroll-Management-System-1.0-Remote-Code-Execution.html | Exploit |
Configurations
History
30 Apr 2025, 16:21
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/ShellUnease/payroll-management-system-rce - Exploit, Third Party Advisory | |
References | () https://packetstormsecurity.com/files/179106/Payroll-Management-System-1.0-Remote-Code-Execution.html - Exploit | |
CPE | cpe:2.3:a:oretnom23:payroll_management_system:1.0:*:*:*:*:*:*:* | |
First Time |
Oretnom23
Oretnom23 payroll Management System |
Information
Published : 2024-06-17 21:15
Updated : 2025-04-30 16:21
NVD link : CVE-2024-34833
Mitre link : CVE-2024-34833
CVE.ORG link : CVE-2024-34833
JSON object : View
Products Affected
oretnom23
- payroll_management_system
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type