[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Sisfokol 4.0 Arbitrary File Upload Vulnerability

Author
cr4wl3r
Risk
[
Security Risk Medium
]
0day-ID
0day-ID-19572
Category
web applications
Date add
16-10-2012
Platform
php
Product.                   Sisfokol 4.0
Download.          http://sisfokol.bitnet.web.id/
Platform.                  PHP
Affected versions.         4.0 possibly others
Solution Status.       No response from the vendor
Severity Rating.           High
Impact.                    Exposure of sensitive information
                           Exposure of system information
                           System Access
Attack Vector.             Remote without authentication
CVE reference.             CVE - not yet assigned
 
Details
The web application is vulnerable to multiple security
vulnerabilities, such as Unauthenticated File Upload
 
Remote Bypass Authentication
All form in direktori [Sisfokol]/janissari/k/ does not require authentication
to upload a file. By issuing a POST request with a webshell
embedded in a JPEG image it is possible to upload [Sisfokol]/filebox/
 
Direktori Affected
Sisfokol/janissari/k/profil/profil.php
Sisfokol/janissari/k/album/album_detail.php
Sisfokol/janissari/k/artikel/artikel_post_filebox.php
Sisfokol/janissari/k/buletin/buletin_post_filebox.php
Sisfokol/janissari/k/jurnal/jurnal_post_filebox.php
 
Discovered by.
Ramdan Yantu aka cr4wl3r from Undergroundthalo Hacking Team
 
Undergroundthalo Hacking Team
Site: http://0xuht.org
Twitter: @hackb0x



#  0day.today [2024-12-26]  #