46 lines
No EOL
2.8 KiB
Text
46 lines
No EOL
2.8 KiB
Text
###############################################################################################
|
|
# ___ ___ _
|
|
# / _ \ / _ \ | |
|
|
# __ _| | | | | | |_ __ ___ _ __ ___| |_
|
|
# / _` | | | | | | | '_ \/ __| | '_ \ / _ \ __|
|
|
# | (_| | |_| | |_| | | | \__ \_| | | | __/ |_
|
|
# \__, |\___/ \___/|_| |_|___(_)_| |_|\___|\__|
|
|
# __/ |
|
|
# |___/
|
|
###############################################################################################
|
|
#INFO:
|
|
#Program Title ################################################################################
|
|
#e107 <= 0.7.8 - Arbitrary File Upload
|
|
#
|
|
#Description ##################################################################################
|
|
#"e107 is a content management system written in PHP and using the popular open source MySQL
|
|
#database system for content storage. It's completely free, totally customisable and in
|
|
#constant development" - e107.org
|
|
#
|
|
#Script Download ##############################################################################
|
|
#http://e107.org/edownload.php
|
|
#
|
|
#Original Advisory ############################################################################
|
|
#http://www.g00ns-forum.net/showthread.php?t=9388
|
|
#
|
|
#Vuln #########################################################################################
|
|
#vuln discovered by clorox
|
|
#shoutz: z3r0, milf, blackhill, godxcel, murderskillz, kirby, katalyst, SyNiCaL, OD, pr0be, rezen, str0ke,
|
|
#fish, rey, canuck, ,vipsta, c0ma, grumpy, sick, trin, asdfhacks.com , a59, freeillwill.com, seven, tower, fury,
|
|
#SS, <S>, Bernard, rst.void.ru, awesome andrew, and everyone else at g00ns.net
|
|
#
|
|
#Details ######################################################################################
|
|
#note: e107 is only vulnerable if it allows you to upload a photograph, avatars will not work.#
|
|
#to enable this an admin has to manually the settings in change e107_admin/users.php?options #
|
|
###############################################################################################
|
|
#signup.php does not verify that a file submitted as an image is actually an image. it controls files uploaded
|
|
#only by the extension. files with a .php extension are blocked, but you can simply rename a php document to
|
|
#document.php.jpg and it passes the image verification and is uploaded. to get the path of the file you uploaded
|
|
#you view your profile, view the source of the page and search for the name of the file and it will be there with
|
|
#a few random numbers in it, and now all an attacker would have to do is simply call the evil script up and the
|
|
#server has been compromised.
|
|
#GoogleDork: "Please note: Any image uploaded to this server that is deemed inappropriate by the administrators will be deleted immediately."
|
|
#
|
|
################################################################################################
|
|
|
|
# milw0rm.com [2007-06-24] |