Lädt...

🕵️ Stripo Inc: Unrestricted File Upload on https://my.stripo.email and https://stripo.email


Nachrichtenbereich: 🕵️ Sicherheitslücken
🔗 Quelle: vulners.com


image
Hi Stripo Inc, I found 2 Unrestricted File Upload Vulnerabilities on your website. First Vulnerability: Step to Reproduce 1. Create an account in "https://my.stripo.email" 2. Simply Download a php shell from internet and open with text editor. ex: r57 shell 3. Then save it as JPEG file. 4. Go back to your stripo account and click on your profile icon on the top right corner of the website and go to show profile. (Try saving it as default .php document it does not let you to upload the php malicious shell ) 5. Upload your shell saved as JPEG as profile picture. 6. After that this message will pop up on the screen "User icon has been saved". Second Vulnerability: Step to Reproduce 1. Go to the URL "https://stripo.email/template-order/" 2. Scroll down to "Click or Drop file here" 3. Try Uploading .php shell downloaded earlier. (It does not allow you to upload php malicious shells) 4. Now Upload the Shell that saved as JPEG. 5. You will allow to upload Malicious shells saved as JPEG (image) Please look at the Attached images. Impact The consequences of unrestricted file upload can vary, including complete system takeover, an overloaded file system or database, forwarding attacks to back-end systems, and simple defacement.Here is the list of attacks that the attacker might do: --Compromise the web server by uploading and executing a web-shell which can run commands, browse system files, browse local resources, attack other servers, and exploit the local... ...

🕵️ Stripo Inc: Unrestricted File Upload on https://my.stripo.email and https://stripo.email


📈 101.19 Punkte
🕵️ Sicherheitslücken

🕵️ Stripo Inc: my.stripo.emai email verification bypassed and also create email templates


📈 56.5 Punkte
🕵️ Sicherheitslücken

🕵️ Stripo Inc: Strored Xss on https://my.stripo.email/ ( multiple inputs)


📈 53.7 Punkte
🕵️ Sicherheitslücken

🕵️ Stripo Inc: [www.stripo.email] There is no rate limit for contact-us endpoints


📈 50.15 Punkte
🕵️ Sicherheitslücken

🕵️ Stripo Inc: CORS on my.stripo.email


📈 50.15 Punkte
🕵️ Sicherheitslücken

🕵️ Stripo Inc: Tabnabbing in template comments - stripo.email


📈 50.15 Punkte
🕵️ Sicherheitslücken

🕵️ Stripo Inc: subdomain takeover at status-stage0.stripo.email


📈 50.15 Punkte
🕵️ Sicherheitslücken

🕵️ Stripo Inc: Clickjacking on my.stripo.email for MailChimp credentials


📈 50.15 Punkte
🕵️ Sicherheitslücken

🕵️ Stripo Inc: subdomain takeover at status0.stripo.email


📈 50.15 Punkte
🕵️ Sicherheitslücken

🕵️ Stripo Inc: stripo blog search SQL Injection


📈 45.16 Punkte
🕵️ Sicherheitslücken

🕵️ Stripo Inc: Bypass email verification and create email template with the editor


📈 38.86 Punkte
🕵️ Sicherheitslücken

🕵️ CVE-2024-6083 | PHPVibe 11.0.46 Media Upload Page upload-mp3.php file unrestricted upload


📈 33.07 Punkte
🕵️ Sicherheitslücken

🕵️ CVE-2023-1970 | yuan1994 tpAdmin 1.3.12 Upload.php Upload file unrestricted upload


📈 33.07 Punkte
🕵️ Sicherheitslücken

🕵️ Stripo Inc: No rate limit in email subscription


📈 32.51 Punkte
🕵️ Sicherheitslücken

🕵️ Stripo Inc: No rate limiting for confirmation email lead to huge Mass mailings


📈 32.51 Punkte
🕵️ Sicherheitslücken

🕵️ Stripo Inc: No rate limiting for subscribe email + lead to Cross origin misconfiguration


📈 32.51 Punkte
🕵️ Sicherheitslücken