CVE-2013-10047

An unrestricted file upload vulnerability exists in MiniWeb HTTP Server <= Build 300 that allows unauthenticated remote attackers to upload arbitrary files to the server’s filesystem. By abusing the upload handler and crafting a traversal path, an attacker can place a malicious .exe in system32, followed by a .mof file in the WMI directory. This triggers execution of the payload with SYSTEM privileges via the Windows Management Instrumentation service. The exploit is only viable on Windows versions prior to Vista.
CVSS

No CVSS.

Configurations

No configuration.

History

06 Aug 2025, 14:15

Type Values Removed Values Added
References () https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/http/miniweb_upload_wbem.rb - () https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/http/miniweb_upload_wbem.rb -
References () https://www.exploit-db.com/exploits/27607 - () https://www.exploit-db.com/exploits/27607 -

04 Aug 2025, 15:06

Type Values Removed Values Added
Summary
  • (es) Existe una vulnerabilidad de carga de archivos sin restricciones en MiniWeb HTTP Server &lt;= Build 300 que permite a atacantes remotos no autenticados cargar archivos arbitrarios al sistema de archivos del servidor. Al abusar del controlador de carga y crear una ruta de acceso, un atacante puede colocar un archivo .exe malicioso en system32, seguido de un archivo .mof en el directorio WMI. Esto desencadena la ejecución de un payload con privilegios SYSTEM a través del servicio Instrumental de administración de Windows. El exploit solo es viable en versiones de Windows anteriores a Vista.

01 Aug 2025, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-01 21:15

Updated : 2025-08-06 14:15


NVD link : CVE-2013-10047

Mitre link : CVE-2013-10047

CVE.ORG link : CVE-2013-10047


JSON object : View

Products Affected

No product.

CWE
CWE-434

Unrestricted Upload of File with Dangerous Type