<<< Date Index >>>     <<< Thread Index >>>

imageVue16.1 upload vulnerability



ImageVue is an online Flash gallery for viewing images. For more information 
about ImageVue visit http://www.imagevuex.com

Credits: me

Vulnerable Systems:
imageVue16.1

In ImageVue one can upload images to the Gallery. The upload-script however 
isn't checking credentials nor does it check file extensions i.e. it's possible 
for any user to upload any file as long as the 'right' permissions have been 
set for the uploading folder.

Exploit:
1) check folder permissions
http://[target]/dir.php
An XML-document is shown containing all folders and their permissions.
2) upload a file to a folder from the XML
http://[target]/admin/upload.php?path=../[foldername]
Now you're ready to upload any file.

Other vulnerabilities:
1) view dir listings
http://[target]/readfolder.php?path=[path]&ext=[extension]
2) querystring is passed to style and body
http://[target]/index.php?bgcol=[input]