This exploit demonstrates an arbitrary file upload vulnerability in Fleet Manager by hyvikk, allowing attackers to upload a PHP shell disguised as a vehicle image. The uploaded shell is stored in the /uploads/ directory and can be executed to achieve remote code execution (RCE).
Classification
Working Poc 95%
Target:
Fleet Manager by hyvikk (All versions)
Auth required
Prerequisites:
Access to the vehicle creation page · Valid session cookies (PHPSESSID, XSRF-TOKEN, laravel_session)