Sinisterly
SMF 2.0 RC5 Remote Shell Upload Exploit - Printable Version

+- Sinisterly (https://sinister.ly)
+-- Forum: Hacking (https://sinister.ly/Forum-Hacking)
+--- Forum: Website & Server Hacking (https://sinister.ly/Forum-Website-Server-Hacking)
+--- Thread: SMF 2.0 RC5 Remote Shell Upload Exploit (/Thread-SMF-2-0-RC5-Remote-Shell-Upload-Exploit)



SMF 2.0 RC5 Remote Shell Upload Exploit - jalal77 - 04-19-2011

hi guys i m new in this community i m going to share something ...i did any mistake plzz dont comment wid abusive..ok lets start
Go0Gle D0rk : "Powered by SMF 2.0 RC5 "
# Exploit :

You Are Can Upload The Shell in (attachments) Folder from 'SMF 2.0 RC5'
(+) In Any Topic .. Submit New Reply and Upload Shell (*.gif) on Attachment
(+) After Reply .. You Are Can Acess to Shell in :
> http://[target/Path]/attachments/{fileID}_{fileHASH}
> The HASH Is encoder by : SHA1
(+) Because the 'SMF 2.0 RC5' Change the Any Attach name Ex :
'1_86e1d5b5ec318635ec9ece9b4586bd8c1d07faca' << This is From Ex file I'm uploaded From My Local SMF
(+) After You Are Detect The SHA HASH .. acess in the shell !
Usage : http://127.0.0.1:8888/smf/attachments/1_86e1d5b5ec318635ec9ece9b4586bd8c1d07faca
OR acess in this url :
> http://[target/Path]/index.php?action=dlattach;topic={topicID};attach={attach-SHELL-id};image
but this acess with URL not suceeding always plz dont forget to comment...:p



RE: SMF 2.0 RC5 Remote Shell Upload Exploit - jalal77 - 04-21-2011

who is this idiot&why he saying his own name(fuckoff)????