facebook facebook twitter rss

Jobing File Upload Vulnerability

Author: KkK1337 , Published: 16-10-2014
Powered by Jobing File Upload Vulnerability

Author: KkK1337

Google Dork: inurl:"popUpload.asp"

Google Dork: intext:"Powered by Jobing.com Local Jobs"

Exploit path: /popUpload.asp

Exploit example: http://www.[target].com/popUpload.asp

Bypass: php3,phtml,asp,aspx,asp;.txt

File Access:

Document: http://www.naaahrdallas.org/files/819/documents/tech.txt

Image: http://www.naaahrdallas.org/files/819/images/tech.gif

Like us on Facebook :