artworks gallery 1.0 arbitrary file upload rce (authenticated) via edit profile
▸▸▸ Exploit & Vulnerability >> webapps exploit & multiple vulnerability
# Exploit Title: Artworks Gallery 1.0 - Arbitrary File Upload RCE (Authenticated) via Edit Profile # Date: November 17th, 2020 # Exploit Author: Shahrukh Iqbal Mirza (@shahrukhiqbal24) # Vendor Homepage: Source Code & Projects (https://code-projects.org) # Software Link: https://download.code-projects.org/details/9dfede24-03cc-42a8-b319-f666757ac7cf # Version: 1.0 # Tested On: Windows 10 (XAMPP Server) # CVE: CVE-2020-28687 -------------------- Proof of Concept: -------------------- 1. Authenticate as a user (or signup as an artist) 2. Go to edit profile 3. Upload a php-shell as profile picture and click update/save 4. Find your shell at 'http://<ip>/<base_url>/pictures/profile/<shell.php>' and get command execution
Artworks gallery 1.0 arbitrary file upload rce (authenticated) via edit profile Vulnerability / Exploit Source : Artworks gallery 1.0 arbitrary file upload rce (authenticated) via edit profile