what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

PaQFile_Share.txt

PaQFile_Share.txt
Posted Jan 1, 2006
Authored by Dr. Insane

eFileGo v3.01 contains multiple vulnerabilities including remote command execution, file upload, denial of service, and a directory traversal issue in upload.exe. The vulnerable eFileGo web server runs on TCP port 608.

tags | exploit, remote, web, denial of service, tcp, vulnerability, file upload
SHA-256 | 768c9035f9c4f12a0e77234df5e6e3390b5c43d4913e0dc162b9786592abb075

PaQFile_Share.txt

Change Mirror Download
eFileGo 3.01 Multiple Vulnerabilities

Severity:
Critical

Date of release:
31/12/2005

Product url:
http://www.paqtool.com/download.html


Description:
A file share http server. Safely as p2p software, no client needed. You friend can download file from your computer by internet browser
quickly. This software is an easy&fast-send-files software that runs under Windows 95/98/NT/ME/2000/XP. When you want to send a large file,
photos, images, programs, folders and a website etc. on your computer, please try eFileGo. It can send large files that e-mail program
can't do. This software can make receiver visited your computer directly. Your computer will become a server. You just click one button.
It will finish. You need not to wait for an attachment being sent via an email anymore.


Vulnerability Analysis:
Multiple Vulnerabilities have been identified in eFileGo 3.01 that may be used by a remote attacker to succesfully compromise a remote
system.

(1) Directory Traversal attack & Directory Listing

A directory traversal vulnerability is caused due to an input validation error making it possible to escape the user configured root folder and
retrieve arbitrary files on the system via directory traversal attacks using the ".../.../" character sequence.

Example:
http://[host]:608/.../.../.../.../.../windows/
http://[host]:608/.../.../.../.../.../.../windows/explorer.exe


(2) Remote Command Execution

Using the Directory traversal attack disussed above is is possible to execute commands remotely using cmd.exe.

Example:
http://[host]:608/.../.../.../.../.../.../.../.../windows/system32/cmd.exe?/c+dir
This command will list all the file in the /windows/system32/ folder.Be imaginative...



(3) Upload.exe Denial of Service and file upload vulnerability

i) A Denial of service condition have been identified in upload.exe that will make the system consume 50-60% cpu usage. The problem
takes place if the file upload.exe that is used by users to upload new files to the server takes an invalid upload directory as a parametre.
example:
http://[host]:608/dasjf9832root/cgi-bin/upload.exe?/some_random_directory...

ii) A second vulnerability exists in upload.exe that may be used by remote malicious users to upload files anywhere on the hard disk.
In order for this bug to work succesfully must be combined with the directory traversal bug above.
Example: LEts say that i want to put the file nc.exe into /windows folder. The first thing i have to do is to use the
http://[host]/.../.../.../.../.../windows/ and then just use the upload function to upload the file to the /windows folder.
Finally we will get something like this:
(http://[host]:608/dasjf9832root/cgi-bin/upload.exe?/.../.../.../.../.../.../windows/)
Local file "C:\test\nc.exe" is uploaded to the server successfully.

***Be carefull! if you try to access directly the /cgi-bin/upload.exe?/.../.../.../.../.../.../windows/ without having use the traversal bug
first it won't work and the file nc.exe will result in the already specified folder.


credit:
dr_insane












Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close