2021-03-10 at 5:47 PM UTC
You could upload a shell, a shell allows you to read and write. But if your target is vulnerable to this exploit it will be vulnerable to an RCE as well most likely. See this dir
https://github.com/vulhub/vulhub/tree/master/nginx/CVE-2013-4547/php-fpmIt has a conf file right. Try to see if you can use the auth bypass to read the config file.
Check it for the details described here.
https://github.com/neex/phuip-fpizdamAnd while you're there you could always write your own variant of the tool available at that repo if you want to.
The following users say it would be alright if the author of this
post didn't die in a fire!
2021-03-10 at 5:53 PM UTC
I wish I could understand what language you Nerds are talking.
2021-03-10 at 6:28 PM UTC
Originally posted by Robert Mugabe
I wish I could understand what language you Nerds are talking.
We're speaking cyborg.
The following users say it would be alright if the author of this
post didn't die in a fire!