# # # # # # Exploit Title: Job Links - Complete Job Management Script - Arbitrary File Upload # Dork: N/A # Date: 26.09.2017 # Vendor Homepage: http://teamworktec.com/ # Software Link: https://codecanyon.net/item/job-links-complete-job-management-script/20672089 # Demo: http://teamworktec.com/demo/job-links/ # Version: N/A # Category: Webapps # Tested on: WiN7_x64/KaLiLinuX_x64 # CVE: N/A # # # # # # Exploit Author: Ihsan Sencan # Author Web: http://ihsan.net # Author Social: @ihsansencan # # # # # # Description: # # The vulnerability allows an Job Seeker & Employer users upload arbitrary file.... # # Vulnerable Source: # # changes in user profile # */ # public function profileChange(Request $request){ # $users = User::find(Auth::id()); # if (!empty($request->avatar)) { # $large_image = public_path('uploads/'.$users->avatar); # File::delete($large_image); # $file = $request->avatar; # $users->avatar = $file->getClientOriginalName(); # $users->save(); # $file->move('uploads', $file->getClientOriginalName()); # return $request->avatar->getClientOriginalName(); # } else # return $users->avatar; # } # # /* # change Cover picture # */ # public function coverChange(Request $request){ # $users = User::find(Auth::id()); # # if (!empty($request->cover)) { # $large_image = public_path('uploads/'.$users->cover); # File::delete($large_image); # $file = $request->cover; # $users->cover = $file->getClientOriginalName(); # $users->save(); # $file->move('uploads', $file->getClientOriginalName()); # return $request->cover->getClientOriginalName(); # } else # return $users->cover; # } # # Proof of Concept: # # http://localhost/[PATH]/profile/[UserName] # http://localhost/[PATH]/uploads/[FILE] # # Etc.. # # # # #