Share
## https://sploitus.com/exploit?id=PACKETSTORM:174412
====================================================================================================================================  
| # Title : InterPhoto 2.3.0 Persians Remote Shell Upload vulnerability |  
| # Author : indoushka |  
| # Tested on : windows 10 Français V.(Pro) / browser : Mozilla firefox 63.0.3 (32-bit) |  
| # Vendor : http://www.dl.persianscript.ir/script/InterPhoto_2.3.0_Persians(PersianScript.ir).zip |  
| # Dork : InterPhoto 2.3.0 ' |  
====================================================================================================================================  
  
poc :  
  
[+] Dorking İn Google Or Other Search Enggine.  
  
[+] Register an Account : http://site/register.php  
  
[+] Upload the shell.php instead of your photo (shell.php.jpg) : http://site/mydesk.upload.php  
  
[+] so rename shell.php.jpg to shell.php by Live HTTP Headers.(Mozilla FireFox Add-ons)  
  
[+] Locate the shell in this route : http://site/MyWebsiteImages/XX/original/YY.php  
  
[+] XX=Name of This Folder Like This Pattern : Year_Month_RandomChar(Sample : 2012_10_oZUGCD7IP81I)  
  
[+] YY=Name of Shell.(Renamed to Random Char)  
  
Greetings to :=========================================================================================================================  
jericho * Larry W. Cashdollar * brutelogic* shadow_00715 *9aylas*djroot.dz*LiquidWorm*Hussin-X*D4NB4R *ViRuS_Ra3cH *yasMouh* CraCkEr |  
=======================================================================================================================================