[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

vBulletin 3.8.* - 4.* DownloadsII poison nullbyte

Author
Un-Dead
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-11737
Category
web applications
Date add
12-04-2010
Platform
php
=================================================
vBulletin 3.8.* - 4.* DownloadsII poison nullbyte 
=================================================


# Exploit Title: VBulletin 4.* DownloadsII poison nullbyte

# Date: 2010-04-12

# Author: Un-Dead

# Team: ex.ploit ( http://ex.ploit.net )

# Software Link: http://www.vbulletin.org/forum/showthread.php?t=231427

# Version: VBulletin 4.* and VBulletin 3.8.* using DownloadsII module

# Tested on: Windows XP SP3

# Usage: poison nullbyte

# File upload bypass using nullbyte

# Code:

 

Upload a regular file that follows the guidelines of the uploader. Be it .rar, .pdf, etc.

 

Once you have uploaded your file you will have the ability to upload images.

 

Upload your file via nullbyte.

 

Ex: exploit.php%00.jpg

 

Once this is uploaded you will see the link to the direct file as:

http://www.target-site.com/PathToVB/downloads/exploit.php_NULL.jpg

 

However in the downloads directory itself it will have dropped the .jpg extension. So just remove “_NULL.jpg” and your good to go.

 

Further edit: It’s noted this also works on the initial file upload, however something like exploit.php%00.rar will turn into randomnumbers-exploit.php making it hard to track down your file.



#  0day.today [2024-07-05]  #