This is a writeup describing a remote file inclusion vulnerability in CF Image Host, where an attacker can upload a malicious shell disguised as an image file (JPG/GIF) to achieve remote code execution. The steps involve creating a shell file with an image extension and uploading it via the vulnerable upload mechanism.
Classification
Writeup 80%
Target:
CF Image Host 1.1
No auth needed
Prerequisites:
Access to the upload functionality at /upload.php · Ability to craft a malicious shell file with an image extension