时间:2021-05-24
vBulletin PhotoPost vBGallery v2.x Remote File Upload
Found by : Cold z3ro
e-mail : exploiter@hackteach.org
Home page : www.Hack.ps
==============================
exploit usage :
http://localhost/Forum/$gallery_path/upload.php
here the exploiter can upload php shell via this script
by renamed it's name to $name.php.wmv
but first he should be a user in the forum
thats so important to him cus the uploaded file will be
in his account nomber folder .
example :
user : Cold z3ro
http://www.hackteach.org/cc/member.php?u=4
his account nomber is 4 as shown in link ,
the uploaded file ( shell ) will be in
http://localhost/Forum/$gallery_path/files/4/$name.php.wmv
id the user Cold z3ro have acconut nomber as example ( 12345 )
the file path is
http://localhost/Forum/$gallery_path/files/1/2/3/4/5/$name.php.wmv
===================
i want tho thank all members in www.hackteach.org forums , best work u are done.
thank u .
# hackteach.org
声明:本页内容来源网络,仅供用户参考;我单位不保证亦不表示资料全面及准确无误,也不保证亦不表示这些资料为最新信息,如因任何原因,本网内容或者用户因倚赖本网内容造成任何损失或损害,我单位将不会负任何法律责任。如涉及版权问题,请提交至online#300.cn邮箱联系删除。
如果d:\upload\file\文件夹不存在,会报错StringstrPath="d:\\upload\\file\\2.mp3";Filefile=newF
复制代码代码如下:$file='video_file';$config['upload_path']='./video_folder/';$config['al
1:上传图片publicfunctionupdateFeedbackImg(Request$request){$bool=false;$upload_file=
Js代码$('#file_upload').uploadify({buttonImage:'${ctx}/commons/uploaddify/img/brow
CSS.upload-btn-box{margin-bottom:10px;button{margin-right:10px;}input[type=file]