puzzle creator CMS File Upload vulnerability

2017.04.23
Risk: High
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

* Title: puzzle creator CMS File Upload vulnerability * date: 4/22/2017 * Exploit Author : Gudrdiran Security Team * Google Dork : intitle:"puzzle creator" "index.php=difficulty=" * Softwar Link : http://www.puzzle-maker.com/ * Vendor Homepage: https://www.nimble.com/ * Tested On : Kali Linux w3af / Windows 8.1 ---------------------------------- Description : Hello Guys This is a file upload exploit we can upload our shell With Tamper data or Live Http Header Dir Shell: When You Bypass Your Shell With Tamper Data Or Live Http Header Target Will Be Shown you The URL( Shell ) Usually Dir Shell : /puzzle/name_shell.php Poc: Page vulnerable : [/puzzle/] Exploit : /puzzle/upload.php Demo: http://www.brandonbrady.com/puzzle/upload.php http://www.kidtopia.info/puzzle/upload.php http://www.teachertopia.info/puzzle/upload.php * Special Tnx : cod3!nj3ct!0n , REX , alizombie , abarestan , MR.IMAN , reza attacker , No_one , dastmale-sorkh , 1TED , Reza Attacker , J.ALL_Editor , S9pY, * Discovered By : DeMoN * We Are Guardiran Security Team


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top