This exploit demonstrates a command execution vulnerability in PHP Jokesite V 2.0 by submitting a POST request to the 'exec.php' endpoint with a user-controlled command. The form-based PoC allows arbitrary command execution on the target system.
Classification
Working Poc 90%
Attack Type
Rce
Complexity
Trivial
Reliability
Reliable
Target:PHP Jokesite V 2.0
No auth needed
Prerequisites:Access to the admin/setup/exec.php endpoint