Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-5510 PoC — PHPGurukul Hostel Management System SQL注入漏洞

Source
Associated Vulnerability
Title:PHPGurukul Hostel Management System SQL注入漏洞 (CVE-2020-5510)
Description:PHPGurukul Hostel Management System是一套旅馆管理系统。 PHPGurukul Hostel Management System v2.0版本中存在SQL注入漏洞。该漏洞源于基于数据库的应用缺少对外部输入SQL语句的验证。攻击者可利用该漏洞执行非法SQL命令。
Description
Car Rental Project v.1.0 Remote Code Execution
Readme
#### CVE-2020-5509 - Remote Code Execution proof-of-concept

Proof of concept exploit for CVE-2020-5509

RCE in the Car Rental Project v.1.0 web application via authenticated arbitrary file upload

```
# Exploit Title: Car Rental Project v.1.0 Remote Code Execution
# Google Dork: N/A
# Date: 1/3/2020
# Exploit Author: FULLSHADE
# Vendor Homepage: https://phpgurukul.com/
# Software Link: https://phpgurukul.com/car-rental-project-php-mysql-free-download/
# Version: 1.0
# Tested on: Windows
# CVE : CVE-2020-5509
```
#### Manual POC method

1. Visit carrental > admin login > changeimage1.php
2. Upload a php rce vulnerable payload
3. Visit /carrentalproject/carrental/admin/img/vehicleimages/<RCE>.php to visit your file
4. Execute commands on the server

#### Description

Car Rental Project v.1.0 is vulnerable to arbitrary file upload since an admin can change the image of a product and the file change PHP code doesn't validate
or care what type of file is submitted, which leads to an attack having the ability to
upload malicious files. This Python POC will execute arbitrary commands on the remote server.

![image of RCE](poc-rce.png)

#### Disclosure

```
>> Contacted company/author
>> No response
>> Requested CVE / public release
```
File Snapshot

[4.0K] /data/pocs/fc6d43ac5a14f9ae4d27546e46035f8cb192aa62 ├── [2.9K] CVE-2020-5509-rce-poc.py ├── [ 70K] poc-rce.png └── [1.2K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.