Sisfokol 4.0 – Arbitrary File Upload

  • 作者: cr4wl3r
    日期: 2012-10-17
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/22038/
  • Undergroundthalo Hacking Team - Security Advisory
    
    Release Date.13-Okt-2012
    Last Update. - 
    Vendor Notification Date.14-Okt-2012
    Product. Sisfokol 4.0
    Download.		 http://sisfokol.bitnet.web.id/
    Platform.PHP
    Affected versions. 4.0 possibly others
    Solution Status.	 No response from the vendor
    Severity Rating. High
    Impact.Exposure of sensitive information
     Exposure of system information
     System Access
    Attack Vector. Remote without authentication
    CVE reference. CVE - not yet assigned
    
    Details
    The web application is vulnerable to multiple security
    vulnerabilities, such as Unauthenticated File Upload
    
    Remote Bypass Authentication
    All form in direktori [Sisfokol]/janissari/k/ does not require authentication
    to upload a file. By issuing a POST request with a webshell
    embedded in a JPEG image it is possible to upload [Sisfokol]/filebox/
    
    Direktori Affected
    Sisfokol/janissari/k/profil/profil.php
    Sisfokol/janissari/k/album/album_detail.php
    Sisfokol/janissari/k/artikel/artikel_post_filebox.php
    Sisfokol/janissari/k/buletin/buletin_post_filebox.php
    Sisfokol/janissari/k/jurnal/jurnal_post_filebox.php
    
    Discovered by.
    Ramdan Yantu aka cr4wl3r from Undergroundthalo Hacking Team
    
    Undergroundthalo Hacking Team
    Site: http://0xuht.org
    Twitter: @hackb0x