## https://sploitus.com/exploit?id=PACKETSTORM:174412
====================================================================================================================================
| # Title : InterPhoto 2.3.0 Persians Remote Shell Upload vulnerability |
| # Author : indoushka |
| # Tested on : windows 10 Français V.(Pro) / browser : Mozilla firefox 63.0.3 (32-bit) |
| # Vendor : http://www.dl.persianscript.ir/script/InterPhoto_2.3.0_Persians(PersianScript.ir).zip |
| # Dork : InterPhoto 2.3.0 ' |
====================================================================================================================================
poc :
[+] Dorking İn Google Or Other Search Enggine.
[+] Register an Account : http://site/register.php
[+] Upload the shell.php instead of your photo (shell.php.jpg) : http://site/mydesk.upload.php
[+] so rename shell.php.jpg to shell.php by Live HTTP Headers.(Mozilla FireFox Add-ons)
[+] Locate the shell in this route : http://site/MyWebsiteImages/XX/original/YY.php
[+] XX=Name of This Folder Like This Pattern : Year_Month_RandomChar(Sample : 2012_10_oZUGCD7IP81I)
[+] YY=Name of Shell.(Renamed to Random Char)
Greetings to :=========================================================================================================================
jericho * Larry W. Cashdollar * brutelogic* shadow_00715 *9aylas*djroot.dz*LiquidWorm*Hussin-X*D4NB4R *ViRuS_Ra3cH *yasMouh* CraCkEr |
=======================================================================================================================================