exploit-db-mirror/exploits/php/webapps/48923.txt
Offensive Security 1539c20e48 DB: 2020-10-22
8 changes to exploits/shellcodes

Hrsale 2.0.0 - Local File Inclusion
School Faculty Scheduling System 1.0 - Stored Cross Site Scripting POC
School Faculty Scheduling System 1.0 - Authentication Bypass POC
GOautodial 4.0 - Authenticated Shell Upload
Stock Management System 1.0 - 'Product Name' Persistent Cross-Site Scripting
Stock Management System 1.0 - 'Categories Name' Persistent Cross-Site Scripting
Stock Management System 1.0 - 'Brand Name' Persistent Cross-Site Scripting
Tiki Wiki CMS Groupware 21.1 - Authentication Bypass
2020-10-22 05:02:10 +00:00

17 lines
No EOL
658 B
Text

# Exploit Title: GOautodial 4.0 - Authenticated Shell Upload
# Author: Balzabu
# Discovery Date: 07-23-2020
# Vendor Homepage: https://goautodial.org/
# Software Link: https://goautodial.org/GOautodial-4-x86_64-Final-20191010-0150.iso.html
# Tested Version: 4.0 (Last relase as of today)
# Tested on OS: CentOS 7
# STEPS TO REPRODUCE:
1 - Log in as an agent
2 - Write a new message to user goadmin with random subject and text
3 - Attach your webshell to the message
4 - Access your shell at
https://www.foo.com/uploads/year/month/shellname.php ( Example:
https://XXX.XXX.XXX.XXX/uploads/2020/07/shell.php )
5 - Priv esc and enjoy ... :-)