Subscribe via feed.

Booked Scheduler 2.7.5 Remote Command Execution

Posted by deepcore on March 5, 2019 – 6:35 pm

This Metasploit module exploits a file upload vulnerability Booked 2.7.5. In the “Look and Feel” section of the management panel, you can modify the Logo-Favico-CSS files. Upload sections has file extension control except favicon part. You can upload the file with the extension you want through the Favicon field. The file you upload is written to the main directory of the site under the name “custom-favicon”. After you upload the php payload to the main directory, the exploit executes the payload and receives a shell.


This post is under “exploit” and has no respond so far.
If you enjoy this article, make sure you subscribe to my RSS Feed.

Post a reply

You must be logged in to post a comment.