Lucene search

K
zdtG00n1337DAY-ID-1970
HistoryJun 24, 2007 - 12:00 a.m.

e107 <= 0.7.8 (photograph) Arbitrary File Upload Vulnerability

2007-06-2400:00:00
g00n
0day.today
65

Exploit for unknown platform in category web applications

==============================================================
e107 <= 0.7.8 (photograph) Arbitrary File Upload Vulnerability
==============================================================




###############################################################################################
#         ___   ___                         _
#        / _ \ / _ \                       | |
#   __ _| | | | | | |_ __  ___   _ __   ___| |_
#  / _` | | | | | | | '_ \/ __| | '_ \ / _ \ __|
# | (_| | |_| | |_| | | | \__ \_| | | |  __/ |_
#  \__, |\___/ \___/|_| |_|___(_)_| |_|\___|\__|
#   __/ |
#  |___/
###############################################################################################
#INFO:
#Program Title ################################################################################
#e107 <= 0.7.8 - Arbitrary File Upload
#
#Description ##################################################################################
#"e107 is a content management system written in PHP and using the popular open source MySQL 
#database system for content storage. It's completely free, totally customisable and in 
#constant development" - e107.org
#
#Script Download ##############################################################################
#http://e107.org/edownload.php
#
#Vuln #########################################################################################
#vuln discovered by clorox
#shoutz: z3r0, milf, blackhill, godxcel, murderskillz, kirby, katalyst, SyNiCaL, OD, pr0be, rezen, 
#fish, rey, canuck, ,vipsta, c0ma, grumpy, sick, trin, asdfhacks.com , a59, freeillwill.com, seven
#
#Details ######################################################################################                         
#note: e107 is only vulnerable if it allows you to upload a photograph, avatars will not work.#
#to enable this an admin has to manually the settings in change e107_admin/users.php?options  #
###############################################################################################
#signup.php does not verify that a file submitted as an image is actually an image. it controls files uploaded
#only by the extension. files with a .php extension are blocked, but you can simply rename a php document to
#document.php.jpg and it passes the image verification and is uploaded.  to get the path of the file you uploaded
#you view your profile, view the source of the page and search for the name of the file and it will be there with 
#a few random numbers in it, and now all an attacker would have to do is simply call the evil script up and the
#server has been compromised.
#GoogleDork: "Please note: Any image uploaded to this server that is deemed inappropriate by the administrators will be deleted immediately."
#
################################################################################################



#  0day.today [2018-01-02]  #