header-logo
Suggest Exploit
vendor:
SportsPanel
by:
Stack
9.3
CVSS
HIGH
Remote File Upload
N/A
CWE
Product Name: SportsPanel
Affected Version From: 0.0.1
Affected Version To: 0.0.1
Patch Exists: No
Related CWE: N/A
CPE: cpe:a:sportspanel:sportspanel:0.0.1
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

Sports Clubs Web Panel 0.0.1 Remote File upload exploit

Sports Clubs Web Panel 0.0.1 is vulnerable to a remote file upload vulnerability. An attacker can upload a malicious file to the server by exploiting the 'Add Ground' functionality. The application does not validate the file type and allows an attacker to upload a malicious file.

Mitigation:

The application should validate the file type before allowing it to be uploaded.
Source

Exploit-DB raw data:

--==+============================================================================+==--
--==+   Sports Clubs Web Panel 0.0.1 Remote File upload                          +==--   
--==+============================================================================+==--

 [*] Discovered By: Stack
 [+] Discovered On: 11 Sep 2008
 [+] Download: http://sourceforge.net/project/downloading.php?group_id=188949&use_mirror=ovh&filename=sportspanel-0.0.1a.tar.gz&50146370

hello guys in this script admin need make a directory name grounds in public directory of script for the 'Add Ground' functions work
so then its will be useful for us use this exploit :d
Exploit :
http://localhost/sport/?p=grounds-add
after write any nae in Ground Name select
upload you php script and go to
http://localhost/sport/grounds/
you can see your php file uploaded

# milw0rm.com [2008-09-12]