[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20070813081715.8915.qmail@securityfocus.com>
Date: 13 Aug 2007 08:17:15 -0000
From: rizgar@...uxmail.org
To: bugtraq@...urityfocus.com
Subject: Neuron Blog Admin Permission Bypass and Remote File Upload
Vulnerability
Neuron Blog Admin Permission Bypass and Remote File Upload Vulnerability
------------------------------------------------------------------------
Script : Neuron Blog
Version : 1.1
Site : http://dev.localhost.be/?q=detail-script&id=11
Founder : Rizgar
Contact : rizgar@...uxmail.org and irc.gigachat.net #kurdhack
Thanks : KHC,PH,ColdHackers and all Kurdish script kiddies/hax0rs/lame/l33t/
d0rk : "neuron blog powered"
------------------------------------------------------------------------
Vulnerability details:
This blog the prepare persons to in "/admin" page to the entrance of far away did't hinder. To reach of far away to be done is necessary just a "click" :) www.site.com/admin
The effect area : The modules in admin
Let us look at now /admin/pages/blog-add.php ;
lines = 42 finish 55
<b>file:</b><br/>
<input type="hidden" name="MAX_FILE_SIZE" value="1024000" />
<input name="uploadfile" type="file" />
<p></p>
<b>filetype:</b><br/>
<select name="filetype">
<option value=""></option>
<option value="photo">photo</option>
<option value="document">document</option>
</select>
<p></p>
<input type="submit" name="submit" value="add blog item!" />
</form>
Note : If you join the admin modules add blog will get out. You can throw the file to website :) you can find your file in the link is /example/uploads or anyway can you see the homapage :)
Now relative the PoC
http://www.site.com/admin/blog-add.php
http://www.site.com/uploads/phpshell.php :]
and upload your files :) there is two is choose 1) photo 2) documents
Powered by blists - more mailing lists