"file viewer" remote File upload vulnerability
for shell uploading try .php.jpg or php shell uploading with extention changing [ Tamper data or Live Http headers]
Dork : “file viewer for uploader”
and “File viewer for Uploader (c) 2003 by Dirk Paehl”Goto Google or any other search engine and type the dork “”file viewer for uploader” now select site from there, vulnerable website’s title will be something like “File viewer for Uploader”
after clicking on site you’ll get site url like this :
now replace view.php with upload.php and you’ll get upload options there !
in some sites it will ask for Name n Password
default password for these websites is Admin
Name = Admin
now select your files and upload !
to view your uploaded files goto the 1st view.php and check files’s directory there, now click on your file !
Live Demo :
uploader : http://www.ldcc.net.au/upload.php
Result : http://www.ldcc.net.au/uploaden/i2.html
Find athor websites with google dork.