Skip to content

File Thingie 2.5.7 RCE Exploit PoC via Arbitary File Uplaod

License

Notifications You must be signed in to change notification settings

grimlockx/File-Thingie-2.5.7-RCE

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

12 Commits
 
 
 
 
 
 

Repository files navigation

File Thingie 2.5.7 - Arbitary File Upload to RCE

Arbitary File Upload discovered by Cakes: https://www.exploit-db.com/exploits/47349. This PoC exploits the discovered vulnerability and generates and uploads a webshell.

Usage

usage: filethingieRCE.py [-h] -t TARGET -u USERNAME -p PASSWORD -L LHOST -P LPORT

options:
  -h, --help            show this help message and exit
  -t TARGET, --target TARGET
                        Target URL to ft2.php
  -u USERNAME, --username USERNAME
                        File Thingie username
  -p PASSWORD, --password PASSWORD
                        File Thingie password
  -L LHOST, --LHOST LHOST
                        Local listener ip
  -P LPORT, -LPORT LPORT
                        Local listener port

About

File Thingie 2.5.7 RCE Exploit PoC via Arbitary File Uplaod

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages