The exploit demonstrates a local file editing vulnerability in CMS Balitbang v3.3, allowing arbitrary file writes via the `editfile.php` script. It also includes a file upload vulnerability in `admin_gambar.php` due to insufficient file extension validation.
Classification
Working Poc 90%
Attack Type
Rce
Complexity
Trivial
Reliability
Reliable
Target:CMS Balitbang v3.3
No auth needed
Prerequisites:Access to the vulnerable `editfile.php` or `admin_gambar.php` endpoints