Pasang Iklan

Whatsapp : 0822 5516 1055

Total Pengunjung

Wednesday 15 August 2012

MobileCartly 1.0 Remote File Upload Vulnerability


# Exploit Title: MobileCartly 1.0 Remote File Upload Vulnerability
# Google Dork: -
# Date: 14/08/2012
# Exploit Author: ICheer_No0M
# Vendor Homepage: http://icheernoom.blogspot.com/
# Software Link: http://mobilecartly.com/mobilecartly.zip
# Version: 1.0
# Tested on: Ubuntu 10.10 + PHP 5.3.3
#
#
# 1. Vuln Code : /images/uploadprocess.php
#
#   /*$zip = new ZipArchive;
#   $zip->open($_FILES['uploadedfile']['tmp_name']);
#   $zip->extractTo('productimages/');
#   $zip->close(); */
#
#  Kamu dapat upload file  shell.php on /images/upload.php
#  Lokasi FIle UPLOAD anda ada di sini /productimages/shell.php
#
#
# 2. Vuln Code : /includes/logo-upload-process.php
# /*if (($_FILES["logo-upload"]["type"] == "image/gif")
# || ($_FILES["logo-upload"]["type"] == "image/jpeg")
# || ($_FILES["logo-upload"]["type"] == "image/pjpeg")
# && ($_FILES["logo-upload"]["size"] < 20000))*/
#
# anda dapat upload di /includes/upload-logo.php tapi dengan edit header file.
# cari file anda di sini on /images/logo/shell.php


# 1337day.com [2012-08-15]


sumber

0 komentar:

Popular Posts

@jablayInside. Powered by Blogger.
Scroll To Top