This exploit demonstrates a remote file upload vulnerability in osCSS 1.2.1, allowing an attacker to upload and execute arbitrary files via the file manager. The PoC provides HTML forms to upload files and create new files with arbitrary content.
Classification
Working Poc 90%
Attack Type
Rce
Complexity
Trivial
Reliability
Reliable
Target:osCSS 1.2.1
No auth needed
Prerequisites:Access to the admin/file_manager.php endpoint