lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: 13 Aug 2007 08:17:15 -0000
Subject: Neuron Blog Admin Permission Bypass and Remote File Upload

Neuron Blog Admin Permission Bypass and Remote File Upload Vulnerability

Script : Neuron Blog

Version : 1.1

Site :

Founder : Rizgar

Contact : and #kurdhack

Thanks : KHC,PH,ColdHackers and all Kurdish script kiddies/hax0rs/lame/l33t/ 

d0rk : "neuron blog powered"

Vulnerability details:

This blog the prepare persons to in "/admin" page to the entrance of far away did't hinder. To reach of far away to be done is necessary just a "click" :)

The effect area : The modules in admin

Let us look at now /admin/pages/blog-add.php ;

lines = 42 finish 55

<input type="hidden" name="MAX_FILE_SIZE" value="1024000" />
<input name="uploadfile" type="file" />


<select name="filetype">
<option value=""></option>
<option value="photo">photo</option>             
<option value="document">document</option>


<input type="submit" name="submit" value="add blog item!" />

Note : If you join the admin modules add blog will get out. You can throw the file to website :) you can find your file in the link is /example/uploads or anyway can you see the homapage :)

Now relative the PoC :]

and upload your files :) there is two is choose 1) photo 2) documents

Powered by blists - more mailing lists