Share
## https://sploitus.com/exploit?id=PACKETSTORM:181230
====================================================================================================================================  
| # Title : eClass LMS v6.2.0 shell upload Vulnerability |  
| # Author : indoushka |  
| # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 125.0.1 (64 bits) |  
| # Vendor : https://codecanyon.net/item/eclass-learning-management-system/25613271 |  
====================================================================================================================================  
  
poc :  
  
[+] Dorking ฤฐn Google Or Other Search Enggine.  
  
[+] TAIF learning script contain arbitrary file upload  
  
[+] registered user can upload .php files in profile picture section without any security  
  
[+] profile link : localhost/demo/public/profile/show/  
  
[+] profile link : /demo/public/profile/show/  
  
[+] edit profile photo and upload php files and inspect element your php direction  
  
[+] uploaded file direction :local host /demo/public/images/user_img/16067501901.php <---- random id  
  
[+] just right click the photo and use inspect element you will have your direction  
  
  
Greetings to :==================================================  
jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R |  
================================================================