exploit-db-mirror/exploits/php/webapps/48891.txt
Offensive Security 97ece9d27b DB: 2020-10-17
11 changes to exploits/shellcodes

Employee Management System 1.0 - Cross Site Scripting (Stored)
Employee Management System 1.0 - Authentication Bypass
Alumni Management System 1.0 - Authentication Bypass
Company Visitor Management System (CVMS) 1.0 - Authentication Bypass
Restaurant Reservation System 1.0 - 'date' SQL Injection (Authenticated)
aaPanel 6.6.6 - Privilege Escalation & Remote Code Execution (Authenticated)
Seat Reservation System 1.0 - Remote Code Execution (Unauthenticated)
Hotel Management System 1.0 - Remote Code Execution (Authenticated)
Seat Reservation System 1.0 - Unauthenticated SQL Injection
CS-Cart 1.3.3 - 'classes_dir' LFI
CS-Cart 1.3.3 - authenticated RCE
2020-10-17 05:02:09 +00:00

15 lines
No EOL
458 B
Text

# Exploit Title: CS-Cart authenticated RCE
# Date: 2020-09-22
# Exploit Author: 0xmmnbassel
# Vendor Homepage: https://www.cs-cart.com/e-commerce-platform.html
# Tested at: ver. 1.3.3
# Vulnerability Type: authenticated RCE
get PHP shells from
http://pentestmonkey.net/tools/web-shells/php-reverse-shell
edit IP && PORT
Upload to file manager
change the extension from .php to .phtml
visit http://[victim]/skins/shell.phtml --> Profit. ...!