The_Arhitect Posted February 1, 2012 Report Posted February 1, 2012 swDesk Multiple Vulnerabilities## Title : swDesk Multi Vulnerability# Author : Red Security TEAM# Date : 01/02/2012# Risk : High# Vendor : http://www.swdesk.com/# Tested On : Apache# Contact : Info [ 4t ] RedSecurity [ d0t ] COM# Home : http://RedSecurity.COM## Exploit :## I. Arbitrary File Upload Vulnerability# 1. Go to http://server/create_ticket.php# 2. Fil all Input Fields And Click on Submit Ticket# 3. Click on the View Ticket and you should go to the link Like : http://server/view_ticket.php?email=[Your Email]&id=1# 4. You see Send Message box , Write any thing there and attach your PHP file in the Upload attachment and Click on Send Message# 5. You can see your attachment above Like : Attachment: shell.php , Click on it and you see your PHP code has been runed ## II. PHP Code Injection Vulnerability# 1. Go to http://server/signin.php : Vulnerability Input Fields : email , password# 2. Write your php in Input Fields Like : phpi${@print(RedSecurityTEAM)}## III. XSS Vulnerability# 1. http://server/view_ticket.php?email=example@example.com&id=" onmouseover=alert(1) bad="# 2. http://server/kb_search.php?keywords=" onmouseover=alert(1) bad="&mode=Search## Thanks To : http://1337day.com/ , http://www.exploit-db.com/ , http://securityreason.com/ , http://packetstormsecurity.org/#Sursa: http://www.exploit-db.com/exploits/18443/ Quote
backdoor Posted February 2, 2012 Report Posted February 2, 2012 Din pacate cred ca au rezolvat deja bug-ul ...inceaca pe DevSlide's Online Support System - Powered by swDesk v1.2Send MessageError: PHP files are not supported. Quote