## https://sploitus.com/exploit?id=PACKETSTORM:181230
====================================================================================================================================
| # Title : eClass LMS v6.2.0 shell upload Vulnerability |
| # Author : indoushka |
| # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 125.0.1 (64 bits) |
| # Vendor : https://codecanyon.net/item/eclass-learning-management-system/25613271 |
====================================================================================================================================
poc :
[+] Dorking ฤฐn Google Or Other Search Enggine.
[+] TAIF learning script contain arbitrary file upload
[+] registered user can upload .php files in profile picture section without any security
[+] profile link : localhost/demo/public/profile/show/
[+] profile link : /demo/public/profile/show/
[+] edit profile photo and upload php files and inspect element your php direction
[+] uploaded file direction :local host /demo/public/images/user_img/16067501901.php <---- random id
[+] just right click the photo and use inspect element you will have your direction
Greetings to :==================================================
jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R |
================================================================