header-logo
Suggest Exploit
vendor:
Zeeproperty
by:
ZoRLu
8.8
CVSS
HIGH
Remote File Upload & XSS
434
CWE
Product Name: Zeeproperty
Affected Version From: v1.0
Affected Version To: v1.0
Patch Exists: NO
Related CWE: N/A
CPE: a:zeeproperty:zeeproperty:1.0
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

ZEEPROPERTY v1.0 remote file Upload & XSS

A vulnerability in ZEEPROPERTY v1.0 allows an attacker to upload a malicious file and execute XSS attacks. An attacker can register to the site, add a malicious code to the head of a shell file, upload the file, and then access the file via a direct link. The attacker can then use the link to execute XSS attacks.

Mitigation:

Ensure that all user-supplied input is properly validated and sanitized before being used in the application.
Source

Exploit-DB raw data:

ZEEPROPERTY v1.0 remote file Upload & XSS

author: ZoRLu msn: trt-turk@hotmail.com

home: www.z0rlu.blogspot.com

dork: "Designed & Developed by Zeeways.com"


first register to site 

you add this code your shell to head 

GIF89a; 

example your_shell.php:

GIF89a;
<?

...

...

...

?>

and save your_sheell.php


after login to site and you change your profile ( direckt link: localhost/viewprofile.php )

add your photo ( you_shell.php upload ) after open new page you right clik your photo and select to properties 

copy photo link and paste your explorer go your shell

your_shell:

localhost/script_path/companylogo/[id].php


example for demo:

user: zeeways

passwd: testing:

change profile direckt link: http://www.zeeproperty.com/viewprofile.php

and your_shell link:

http://www.zeeproperty.com/companylogo/5622365.php


XSS for demo:

http://www.zeeproperty.com/view_prop_details.php?propid="><script>alert()</script>


thanks: str0ke & yildirimordulari.org  &  darkc0de.com

# milw0rm.com [2008-11-08]