Best Top List Remote File Upload Vulnerability Aug 11 2007 04:51PM
rizgar linuxmail org
Best Top List Remote File Upload Vulnerability

Script : Best Top List

Version : All Version

Site : (Closed)

Founder : Rizgar

Contact : rizgar (at) linuxmail (dot) org [email concealed] and #kurdhack

Thanks : KHC, PH , ColdHackers

d0rk : "Powered by Best Top List by Szymon Kosok v. 2.11" inurl:"banner-upload.php" "Copyright (c) 2002 - Best-Scripts.TK"


Vulnerability details ;

Best Top List contains a vulnerability that allows remote attackers to upload arbitrary files to any directory in the system. This bug is effective in the link "banner-upload.php." Do you neccessary a phpshell script in the upload server. Your files you loaded the genarally ; in see



Code god ready in one simple shape.;

> cat banner-upload.php

echo "<br><br><center>" . $lang['uploadtxt'] . "<br><br> >>>>>> see :]

<form enctype='multipart/form-data' method='post' action='upload.php'>

<input type='hidden' name='action' value='upload'>

<table frame=box rules=none border=0 cellpadding=2

cellspacing=0 align='center'>



<td><input type='file' name='userfile'></td>



<td>" . $lang['siteurlwohttp'] . ":</td>

<td><input type='input' name='sitename'></td>




<td><input type='submit' name ='upload'




include "footer.php";


[ reply ]


Privacy Statement
Copyright 2010, SecurityFocus