header-logo
Suggest Exploit
vendor:
cardealers
by:
ZoRLu
7.5
CVSS
HIGH
Remote File upload
434
CWE
Product Name: cardealers
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

geta php cardealers Remote File upload

A vulnerability in geta php cardealers allows an attacker to upload a malicious file to the server. An attacker can register to the site, login and edit their profile to upload a malicious file. The malicious file is then accessible at the path localhost/script/re_images/[ID]_logo_your_shell.php. An example of this exploit can be seen in the login http://www.getaphpsite.com/demos/cardealers/login.php with user zorlu and password zorlu1 and the malicious file can be accessed at http://www.getaphpsite.com/demos/cardealers/re_images/1227370217_logo_c.php.

Mitigation:

Ensure that user input is properly validated and sanitized before being used in any file operations.
Source

Exploit-DB raw data:

[~] geta php cardealers Remote File upload
[~]
[~]----------------------------------------------------------
[~] Discovered By: ZoRLu  msn: trt-turk@hotmail.com
[~]
[~] Date: 22.11.2008
[~]
[~] Home: www.z0rlu.blogspot.com
[~]
[~] N0T: YALNIZLIK, YiTiRDi ANLAMINI YALNIZLIGIMDA : ( (
[~] -----------------------------------------------------------

first register to site 

login to site and edit your profile

upload your_shell.php 

your_shell.php path:

localhost/script/re_images/[ID]_logo_your_shell.php

example for demo:

login: http://www.getaphpsite.com/demos/cardealers/login.php

user: zorlu

passwd: zorlu1

shell:

http://www.getaphpsite.com/demos/cardealers/re_images/1227370217_logo_c.php

[~]----------------------------------------------------------------------
[~] Greetz tO: str0ke & all Muslim HaCkeRs
[~]
[~] yildirimordulari.org  &  darkc0de.com
[~]
[~]----------------------------------------------------------------------

# milw0rm.com [2008-11-22]