Login Register






The stories and information posted here are artistic works of fiction and falsehood. Only a fool would take anything posted here as fact.
Thread Rating:
  • 0 Vote(s) - 0 Average


Upload vulnerabilities (MEGA THREAD) filter_list
Author
Message
Upload vulnerabilities (MEGA THREAD) #1
Hello Everyone,

Today I'm going to teach you several upload vulnerabilities.


Q: What are they?

Me: They are files uploaded on websites that allow you to upload your files.

Q: How can I use them to hack a website or deface it?

Me: Most of them don't accept php and html so check if it accepts them.

If it does, upload your shell (php) or your defacement (html or php)
depending on what the site allows and you have hacked it!

If it doesn't accept these file types you can either upload your defacement as an image or you can upload your shell as shell.php.jpg and then change it to shell.php once uploaded (A tut for that could be useful)


Q: Is there another way to use these?

Me: you can upload your jdb or phish passwords pretending to be the owner of the site.

------------------------------------------------

OpenCart vulnerability

Steps:

1) Use this google Dork: Index of /fckeditor/editor/filemanager/connectors/

2)Now open a site that shows files and folders. Navigate to connectors if it's not there already and press the file test.html

3) Now, change the settings from ASP to PHP, select where your file will be uploaded (default is root), browse your shell and press upload. Now you have a shell uploaded!

4) If it doesn't let you upload php, upload your deface in html or if that's disabled too, try uploading it as an image or use some special shells with image extentions.

5) If none of these work then your target is not vulnerable!


------------------------------------------

Drupal Remote File Upload Vulnerability

Steps:

1) Search this google dork:
inurl:"/imce?dir=" intitle:"File Browser"

2) Click on any link that its title is "File Browser" among with something else

3) Click on the "Upload" button

4) Upload your Deface Page

5) Click the link in the box to View the URL

You can also upload a shell as shell.php.html and then change it to shell.php to hack the website.


--------------------------------------------------

RTE Webwiz Vulnerability

steps:

1) go to google.com and search one of these two google dorks.

inurl:rte/my_documents/my_files
inurl:/my_documents/my_files/

2) When you find a site change the url from
site.com/rte/my_documents/my_files/something or site.com/my_documents/my_files/something

to: site.com/admin/RTE_popup_file_atch.asp or site.com/rte/RTE_popup_file_atch.asp

3)from there you will be able to upload your deface!


---------------------------------------

AJAX File Upload vulnerability

Steps:

1st. use one of these 3 dorks:

dork: intitle:Max's AJAX File Upload - AJAX F1
dork2: Powered by AJAX F1
dork3: intitle:File Uploader intextTongueowered by AJAX F1

2nd. Choose a site and upload a shell. (google C99.php for a good shell)

3rd. the url must be: www.asite.com/something/ change it to: www.asite.com/something/yourshell.extention

4rth. You are done! You have shelled the site!


-------------------------------------

Bugtraq File Upload Vulnerability

Steps:

1. Open Google.com and type this dork
intitle:"QuiXplorer 2.3 - the QuiX project"



2. You'll see a lot of sites, some big websites are vulnerable too
select any website from search results

3. Vulnerablity:


http://[localhost]/[path]/index.php?action=list&order=name&srt=yes

http://site.com/[xyz]/index.php?action=list&order=name&srt=yes

4. After Going to this you will see a file manager
you can upload your files here

5. find this edit file create file etc icons in page and click on last, the upload option

-----------------------------------

PhUploader Upload Vulnerability

Steps:

Google Dork : intitleTongueowered By phUploader

Go to Google.com and enter this Dork, see seach results



1. Select any website and upload your file there.

2. Website will allow you to upload .jpg .png .gif anf .png files only.

3. Anyway you can upload your deface in .jpg or if want to upload a shell then upload as
shell.php.jpg
after uploading your file you'll got a message

Your file(s) have been uploaded!


Infin8 Upload Vulnerability

Steps:

1. Got to google.com

2. Search this dork: allinsite:design-your-own-stamp filetype:php

3. Find a website and upload your image defacement or shell.php.jpg

4. Your file will be uploaded here:
thesite.com/images/uploads/upload_5612/yourimage.extention



Sflog! CMS 1.0 Arbitrary File Upload Vulnerability

Steps:

1. Go to http://www.exploit-db.com/exploits/21138/

2. Get the Metasploit code

3. Put it in metasploit and hack the website



Wordpress fckeditor Arbitrary File Upload Vulnerability

Steps:

1. Go to google.com

2. Paste this dork: inurl:/wp-content/plugins/fckeditor-for-wordpress-plugin/fckeditor/editor/filemanager/browser/default/

3. Choose a website and browser to /wp-content/plugins/fckeditor-for-wordpress-plugin/fckeditor/editor/filemanager/browser/default/

4. Now open browser.html and you are in a web based file manager!





----------------------------------------

Thanks for viewing this tut and I hope I helped you!

Reply

RE: Upload vulnerabilities (MEGA THREAD) #2
Damn this is what i call HQ!
Thanks a lot for this huge share! The Thread is bookmarkt! (;
[Image: b9erg.png]
Ж Updated Protection and good boosting Youtube Bot - click here! Ж

Reply

RE: Upload vulnerabilities (MEGA THREAD) #3
Thread moved!

Thanks, OP!
(This post was last modified: 11-11-2012, 07:54 PM by Dismas.)

Reply

RE: Upload vulnerabilities (MEGA THREAD) #4
Great thread, very HQ! Thanks bro Smile
Heart

Reply

RE: Upload vulnerabilities (MEGA THREAD) #5
Thanks for the share bro, nice job.
[Image: 57sQsY2.png]

Reply

RE: Upload vulnerabilities (MEGA THREAD) #6
Super HQ! Great share bro Biggrin


Reply

RE: Upload vulnerabilities (MEGA THREAD) #7
Thanks Everyone! Added 3 more upload vulnerabilities now!

Reply

RE: Upload vulnerabilities (MEGA THREAD) #8
HQ post, keep up the good work, Savsal14!

Reply







Users browsing this thread: 1 Guest(s)