Home / os / win7

osDate (uploadvideos.php) Shell Upload Vulnerability

Posted on 13 September 2010

<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 4.01 Transitional//EN'><html><head><meta http-equiv='Content-Type' content='text/html; charset=windows-1251'><title>osDate (uploadvideos.php) Shell Upload Vulnerability</title><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon'><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss'></head><body><pre>==================================================== osDate (uploadvideos.php) Shell Upload Vulnerability ==================================================== ########################################################## #[~] Date : 05/08/2010 # #[~] Author : Xa7m3d # #[~] Tested ON : ubuntu 9.10 # #[~] MY Team : Currently no # #[~] Software Link : http://www.tufat.com/script39.htm # #[~] E-mail : C1G@hotmail.com # #[~] Language : php # #[~] Dork : N/A # ########################################################## [+] Step 1 : Make sure the uservideos folder exists On the next track [-] localhost/temp/uservideos [+] Step 2 : Register &amp; confirm your account [+] Step 3 : Go To : [-] server/uploadvideos.php [+] step 4 : upload shell.php [+] step 5 : Go here : [-] server/temp/uservideos [+] You will see You shell Like &quot;username_V1_shell.php&quot; ---------greatz---------- Greatz to : All Muslim &amp; Turkish Hacker,All My Friends,www.inj3ct0r.com,www.exploit-db.com,www.securityreason.com,www.securityfocus.com,www.sec-war.com,www.hackteach.org,www.sec-r1z.com,www.hackforums.net,www.1923turk.com,www.no-exploit.com,www.dev-point.com,www.2hacker.com,www.iqs3cur1ty.com,www.arab-exploit.com ..etc Note ~ : I have The quran Memmorized! He can burn Holy Quran all he wants, the message of Islam will never die! Muslim &amp; Tunisian Hacker EnJoY o_O ./3x17 # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-09-13]</pre><script type='text/javascript'>var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));</script><script type='text/javascript'>try{var pageTracker = _gat._getTracker("UA-12725838-1");pageTracker._setDomainName("none");pageTracker._setAllowLinker(true);pageTracker._trackPageview();}catch(err){}</script></body></html>

 

TOP