How I Got $4000 From Visma For RCE

Writeup By Ratnadip Gajbhiye.
I’m not telling any story about my life and I also know you don’t intrested to listen who am i..πŸ˜‹
I always believed that sharing is caring,
so i decided to share my findings with you as it might help others who started in the Bug Bounty journey.
As you already know We are seeing a lot of noise again regarding the Uploadify script vulnerabilities affecting some WordPress themes/plugins.
What is Uploadify :-
Uploadify allows anyone to upload anything they want to your site without any authentication.
First of all, I want to tell you that ... before entering a bug Bounty field, I was a black hat hacker and I hacked and defaced many websites ... so I have information about that How to upload shell in the website...
I always use black hat techniques for hunting bug like admin panel bypass etc... :V
I never Target a main domain, i always Target subdomain..πŸ˜…
So one of my friend Ma*** gave me this site for security testing..
And I target subdomain of that site..
Ex.
https://visma.com
https://citrix.visma.com
So now here is the main Part of this article
how I detect site for RCE and upload a shell less than 10 minutes.
I searched for admin panel
Ex:- https://citrix.visma.com/admin
And its redirect me to WordPress admin panel.. 😍
I have some idea about how to find a theme and plugins error using exploit-db ..πŸ€—
Because I hacked and Defaced many websites using this themes/plugins error..πŸ˜™
So I tried to exploit the theme error using Dorks, I put 4 Dorks in the URL but I did not get success, then I filed the 5th Dork in the URL and I got the upload section.
Without wasting any time I upload a c99.php shell in website and I got access of hole server 😎
Proof of Concept :-
Remote Code Execution via Arbitrary File Upload
# Exploit Title : Wordpress Themes Konzept File Upload Vulnerability
# Author : Ratnadip Gajbhiye
# Google Dork: wp-content/themes/konzept
# Tested on: Lubuntu
# [!] Exploit : Upload section URL
 https://citrix.visma.com//wp-content/themes/konzept/includes/uploadify/uploadify.php
# [!] File Location : C99 Shell URL
 https://citrix.visma.com//wp-content/themes/konzept/includes/uploadify/uploads/c99_locus7s.php






Day 1 :- After reporting this to site got their reply in 5 min. :p
Thank you for your report we have passed to your IT team for fixing it ASAP
and Vulnerability is fixed within 2 Hours.
Day 2 :- The hole has now been patched and the shell is removed, but it will probably require some more time to go through the server before declaring it properly secured again.😏
Day 3 :- discussing with their management department for cash reward. 🀨
Day 4 & 5 :- No reply 😐
Day 6 :- Thank you for your patience in this matter. I’m happy to tell you that we have awarded you a bounty of $4000 USD for this finding.. πŸ€‘
Hope You liked this finding and i apologize for my weak English if there is any mistakes in this post.
Thanks for reading my article, have a great day . πŸ™‚

Comments

Popular posts from this blog

From Hunting for a Laptop to Hunting down Remote Code Execution

Vine User’s Private information disclosure

User Account Takeover [Password Change]— Nice Catch!