CMSsite 1.0 privilege escalation Vulnerability - CXSecurity.com

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1532026 漏洞类型
发布时间 2019-03-13 更新时间 2019-03-13
CVE编号 N/A CNNVD-ID N/A
漏洞平台 N/A CVSS评分 N/A
|漏洞来源
https://cxsecurity.com/issue/WLB-2019030102
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
====================================================================================================================================
| # Title     : CMSsite 1.0 privilege escalation Vulnerability                                                                     |
| # Author    : indoushka                                                                                                          |
| # Tested on : windows 10 Français V.(Pro) / browser : Mozilla firefox 65.0.1 (32-bit)                                            |
| # Vendor    : https://github.com/VictorAlagwu/CMSsite/archive/master.zip                                                         |  
| # Dork      : n/a                                                                                                                |
====================================================================================================================================


poc :


[+]  Dorking İn Google Or Other Search Enggine .

[+]  First register a new member .

[+]  after login to your account automatically redirect you to admin panel. 

[+]  Go To Edit your profile http://127.0.0.1/CMSsite-master/admin/profile.php?section=indoushka & Upload your Ev!l files

[+]  et voila http://127.0.0.1/CMSsite-master/img/csc.php

				
Greetings to :=========================================================================================================================
                                                                                                                                      |
jericho * Larry W. Cashdollar * brutelogic* hyp3rlinx* 9aylas * shadow_00715 * LiquidWorm*                                            |        
                                                                                                                                      |
=======================================================================================================================================