Free Image Hosting Script Remote File Upload Vulnerability
This exploit allows hackers to upload a PHP backdoor into "/pictures/" directory via the use of Live HTTP Headers (Firefox Addon). Tools Needed: Live HTTP Headers, Backdoor Shell. Step 1: Locate upload form on index page. Step 2: Rename your shell to shell.php.jpg and start capturing data with Live HTTP Headers. Step 3: Enter tags for the image (can be anything). Step 4: Replay data with Live HTTP Headers - Step 5: Change [Content-Disposition: form-data; name="image1"; filename="shell.php.jpg"rn] to [Content-Disposition: form-data; name="image1"; filename="shell.php"rn]. Step 6: Locate pictures directory: www.site.tld/imagehostingscript/pictures/ (usually). Step 7: Find PHP file (random digits.php) = should look like (321879194bc8ff2843bf7b63a666f665.php). Step 8: Navigate to backdoor = www.site.tld/imagehostingscript/pictures/321879194bc8ff2843bf7b63a666f665.php