Kleophatra 0.1.4 Shell Upload

2011.03.21
Credit: Xr0b0t
Risk: High
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

[!]===========================================================================[!] [~] Kleophatra 0.1.4 0day Arbitrary Upload File Vulnerability [~] Author : Xr0b0t (xrt.interpol@gmx.us) [~] Homepage : www.indonesiancoder.com | xrobot.mobi | mc-crew.net | exploit-id.com [~] Date : 18 Mart, 2010 [~] Tested on : BlackBuntu RC2 [!]===========================================================================[!] [ Software Information ] [+] Vendor : http://portal.kleophatra.org [+] Download : http://releases.kleophatra.org/kleophatra.zip [+] Price : free [+] Vulnerability : Upload File [+] Dork : "powered by Kleophatra" ;) [+] Version : Kleo 0.1.4 [!]===========================================================================[!] Vulnerable Javascript Source Code: in users.php ------------------------------------------------------------------------ function show_avatar(&$abuff){ $uid = $_SESSION['uid']; $this->tpl_load('avatar.tpl', $abuff); if(isset($_POST['do_avatar'])){ $this->do_avatar(); } } ------------------------------------------------------------------------ in avatar.tpl ------------------------------------------------------------------------ <div align="center"> <h1>{=lang(L_CHANGE_AVATAR)}</h1> <form method="post" enctype="multipart/form-data"> {=lang(L_AVATAR)}:<br/> <input type="file" name="avatar" id="avatar" style="height:25px;" /><br/><br/> <input type="submit" name="do_avatar" value="{=lang(L_CHANGE_AVATAR)}" /><br/><br/> </form> </div> ------------------------------------------------------------------------ [ Default Site ] http://127.0.0.1/kleo/ [ XpL ] [~] Step 1 : Find A CMS With Google Dork [~] Step 2: Register In This Site [~] Step 3: Click On Change Your Avatar [~] Step 4: Click On Upload Images [~] Step 5: Click On File Will Be Uploaded ( Uploaded The File *.php or *.jgp) [~] Step 6: And Click on Change Your Avatar [~] Step 7: You Will See the file media/avatars/"username"/"the file" [ Demo ] Site : http://portal.kleophatra.org/ exploit : http://portal.kleophatra.org/index.php?module=users&action=avatar "Upload The shell.php in change your avatar" Result : http://portal.kleophatra.org/media/avatars/Xr0b0t/shell.php with a default configuration of this script, an attacker might be able to upload arbitrary files containing malicious PHP code due to multiple file extensions isn't properly checked Goo The IndonesianCoder!!! [!]===========================================================================[!] [ Thx TO ] [+] Don Tukulesto DUDUl Kok G rene2... Kal0ng 666 Cepet Jadikan Ntu PRoyek [+] INDONESIAN CODER TEAM IndonesianHacker Malang CYber CREW Magelang Cyber [+] tukulesto,M3NW5,arianom,N4CK0,abah_benu,d0ntcry,bobyhikaru,gonzhack,senot [+] Contrex,YadoY666,yasea,bugs,Ronz,Pathloader,cimpli,MarahMerah.IBL13Z,r3m1ck [+] Coracore,Gh4mb4s,Jack-,VycOd,m0rgue,otong,CS-31,Yur4kha,Geni212 [ NOTE ] [+] OJOK JOTOS2an YO .. [+] Minggir semua Arumbia Team Mau LEwat ;) [+] MBEM : lup u :"> [ QUOTE ] [+] INDONESIANCODER still r0x... [+] ARUmBIA TEam Was Here Cuy MINGIR Kabeh KAte lewat .. [+] Malang Cyber Crew & Magelang Cyber Community


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top