what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

VoltEdit CMS SQL Injection / Shell Upload

VoltEdit CMS SQL Injection / Shell Upload
Posted Aug 18, 2013
Authored by X-Cisadane

VoltEdit CMS suffers from administrative login bypass due to remote SQL injection and allows for PHP shells to be uploaded. Note that this finding houses site-specific data.

tags | exploit, remote, shell, php, sql injection
SHA-256 | e7647ac0f638ac3badc02964265910c1dd8524abebceee54710f8a72dc9f1926

VoltEdit CMS SQL Injection / Shell Upload

Change Mirror Download
========================================================================================== 
VoltEdit CMS SQL Injection Admin Login Bypass & Shell Upload Vulnerability
==========================================================================================

:----------------------------------------------------------------------------------------------------------------------------------------:
: # Exploit Title : VoltEdit CMS SQL Injection Admin Login Bypass & Shell Upload Vulnerability
: # Date : 18 August 2013
: # Author : X-Cisadane
: # CMS Developer : http://www.ady-voltedge.com/website_development.php
: # Version : ALL
: # Category : Web Applications
: # Vulnerability : SQL Injection Admin Login Bypass & Shell Upload Vulnerability
: # Tested On : Version 26.0.1410.64 m (Windows XP SP 3 32-Bit English)
: # Greetz to : X-Code, Borneo Crew, Depok Cyber, Explore Crew, CodeNesia, Bogor-H, Jakarta Anonymous Club, Jabar Cyber, Winda Utari
:----------------------------------------------------------------------------------------------------------------------------------------:

A multiple vulnerabilities has been identified in "VoltEdit CMS", which could be exploited by attackers to bypass security restrictions into
admin panel. Login input is not well sanitized in admin.php which can lead to to include some specials chars used to change SQL syntax so we
can gain admin access. Successful exploitations allows attacker to access into administrative functions without requiring knowledge of the
password. An attackers while login as admin, may upload PHP Shell (Backdoor) use the document uploader feature.

DORKS (How to find the target) :
================================
intext:VoltEdit cms
inurl:/doing_business_here.php
inurl:/map_room.php
inurl:/colleges_universities.php
Or use your own Google Dorks :)

Proof of Concept
================

[ 1 ] SQL Injection Admin Login Bypass
Find the target use the dorks above, for example I'm use this dork inurl:/doing_business_here.php
and got the target www.russellville.org/doing_business_here.php
Change the target URL to /admin.php, for example www.russellville.org/admin.php
After login form appeared, fill the Login ID and Password with '=0#
Gotcha! Pic : http://i43.tinypic.com/fmtesh.png

[ 2 ] Uploading Shell / PHP Backdoor
After login with Administrator Previllege, you can upload PHP Shell
Click Documents menu & Click Choose File
Upload your PHP Shell
Go to http://TARGET/documents/Your Shell.php
Example : http://www.russellville.org/documents/botak.php3

Example of the Vulnerable Sites :
http://www.businessreadywi.com/admin.php
http://www.adyvoltedge.com/index.php
http://www.jcjdc.net/admin.php
http://www.cortlandbusiness.com/admin.php
http://www.morgancoed.com/admin.php
http://www.russellville.org/admin.php
http://drumcountrybusiness.com/admin.php
http://madisoncountyida.com/admin.php
http://chooseeasterniowa.com/admin.php
http://www.putnamcountyindianaeconomicdevelopment.com/admin.php
http://www.foxcitiesregionalpartnership.com/admin.php
http://www.wedobusinesswi.com/admin.php
http://cayuga.adyvoltedge.com/admin.php
http://edwc.org/admin.php
http://www.russellville.org/admin.php
http://www.hancockedc.com/admin.php
http://www.purelansing.com/admin.php
http://www.mcedinc.com/admin.php
http://www.ocedp.com/admin.php
http://scottcountyin.com/admin.php
http://www.putnamcountyindianaeconomicdevelopment.com/admin.php
http://nchcedc.org/admin.php
http://www.jaspercountyin.com/admin.php
http://michiana.adyvoltedge.com/admin.php
http://www.thevalleypartnership.com/admin.php
http://scott.ady-voltedge.com/admin.php
http://highland.ady-voltedge.com/admin.php
etc ...
Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    50 Files
  • 15
    Aug 15th
    33 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close