eClass LMS version 6.2.0 suffers from a remote shell upload vulnerability.
c82e4b148e140d84b1e4d327bad2cf8efab60d29769cb3a98ec6f67d4da5538f
====================================================================================================================================
| # Title : eClass LMS v6.2.0 shell upload Vulnerability |
| # Author : indoushka |
| # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 125.0.1 (64 bits) |
| # Vendor : https://codecanyon.net/item/eclass-learning-management-system/25613271 |
====================================================================================================================================poc :
[+] Dorking İn Google Or Other Search Enggine.
[+] TAIF learning script contain arbitrary file upload
[+] registered user can upload .php files in profile picture section without any security
[+] profile link : localhost/demo/public/profile/show/
[+] profile link : /demo/public/profile/show/
[+] edit profile photo and upload php files and inspect element your php direction
[+] uploaded file direction :local host /demo/public/images/user_img/16067501901.php <---- random id
[+] just right click the photo and use inspect element you will have your direction
Greetings to :==================================================
jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R |
================================================================