Exploit/Advisories no image

Published on October 2nd, 2021 📆 | 3631 Views ⚑

0

Phpwcms 1.9.30 Cross Site Scripting – Torchsec


https://www.ispeech.org

# Exploit Title: Phpwcms 1.9.30 - File Upload to XSS
# Date: 30/9/2021
# Exploit Author: Okan Kurtulus | okankurtulus.com.tr
# Software Link: http://www.phpwcms.org/
# Version: 1.9.30
# Tested on: Ubuntu 16.04

Steps:

1-) You need to login to the system.
http://target.com/phpwcms/login.php

2-) Creating payload with SVG extension: payload.svg

< ?xml version="1.0" standalone="no"?>
< !DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN" "http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd">








3-) Go to the following link and upload the payload:
http://target.com/phpwcms/phpwcms.php?csrftoken=b72d02a26550b9877616c851aa6271be&do=files&p=8

From the menu:

file -> multiple file upload -> Select files or drop here

4-) After uploading payload, call it from the link below.

http://192.168.1.112/phpwcms/upload/

Source link

Tagged with:



Comments are closed.