PHP Logo Designer Script Arbitrary File Upload

PHP Logo Designer Script suffers from a remote file upload vulnerability.


MD5 | 7964b8c6a72e282e33c0362351fbfdf4

# # # # # 
# Exploit Title: PHP Logo Designer Script - Arbitrary File Upload
# Google Dork: N/A
# Date: 30.01.2017
# Vendor Homepage: https://codecanyon.net/item/php-logo-designer/19362231
# Software Buy: https://codecanyon.net/item/php-logo-designer/19362231
# Demo: http://phplogodesigner.000webhostapp.com/
# Version: N/A
# Tested on: Win7 x64, Kali Linux x64
# # # # #
# Exploit Author: Ihsan Sencan
# Author Web: http://ihsan.net
# Author Mail : ihsan[beygir]ihsan[nokta]net
# # # # #
# Exploit :
# http://localhost/[PATH]/designer.php
# http://localhost/[PATH]/theme/images/uploads/[......PHP]
# # # # #
# uploadImage.php
<?php
$output_dir = "./theme/images/uploads/";
.
.
.
$imagetemp = explode(".", $_FILES["imagefile"]["name"]);
$newimagename = round(microtime(true)) . '.' . end($imagetemp);
//move the uploaded file to uploads folder;
move_uploaded_file($_FILES["imagefile"]["tmp_name"],$output_dir. $newimagename);

echo $output_dir . $newimagename;
}

}
?>
# # # # #


Related Posts