How I Got $4000 From Visma For RCE
Writeup By Ratnadip Gajbhiye.
I’m not telling any story about my life and I also know you don’t intrested to listen who am i..π
I always believed that sharing is caring,
so i decided to share my findings with you as it might help others who started in the Bug Bounty journey.
so i decided to share my findings with you as it might help others who started in the Bug Bounty journey.
As you already know We are seeing a lot of noise again regarding the Uploadify script vulnerabilities affecting some WordPress themes/plugins.
What is Uploadify :-
Uploadify allows anyone to upload anything they want to your site without any authentication.
Uploadify allows anyone to upload anything they want to your site without any authentication.
First of all, I want to tell you that ... before entering a bug Bounty field, I was a black hat hacker and I hacked and defaced many websites ... so I have information about that How to upload shell in the website...
I always use black hat techniques for hunting bug like admin panel bypass etc... :V
I never Target a main domain, i always Target subdomain..π
So one of my friend Ma*** gave me this site for security testing..
And I target subdomain of that site..
And I target subdomain of that site..
Ex.
https://visma.com
https://citrix.visma.com
https://visma.com
https://citrix.visma.com
So now here is the main Part of this article
how I detect site for RCE and upload a shell less than 10 minutes.
how I detect site for RCE and upload a shell less than 10 minutes.
I searched for admin panel
Ex:- https://citrix.visma.com/admin
And its redirect me to WordPress admin panel.. π
I have some idea about how to find a theme and plugins error using exploit-db ..π€
Because I hacked and Defaced many websites using this themes/plugins error..π
So I tried to exploit the theme error using Dorks, I put 4 Dorks in the URL but I did not get success, then I filed the 5th Dork in the URL and I got the upload section.
Without wasting any time I upload a c99.php shell in website and I got access of hole server π
Ex:- https://citrix.visma.com/admin
And its redirect me to WordPress admin panel.. π
I have some idea about how to find a theme and plugins error using exploit-db ..π€
Because I hacked and Defaced many websites using this themes/plugins error..π
So I tried to exploit the theme error using Dorks, I put 4 Dorks in the URL but I did not get success, then I filed the 5th Dork in the URL and I got the upload section.
Without wasting any time I upload a c99.php shell in website and I got access of hole server π
Proof of Concept :-
Remote Code Execution via Arbitrary File Upload
Remote Code Execution via Arbitrary File Upload
# Exploit Title : Wordpress Themes Konzept File Upload Vulnerability
# Author : Ratnadip Gajbhiye
# Google Dork: wp-content/themes/konzept
# Tested on: Lubuntu
# Author : Ratnadip Gajbhiye
# Google Dork: wp-content/themes/konzept
# Tested on: Lubuntu
# [!] Exploit : Upload section URL
https://citrix.visma.com//wp-content/themes/konzept/includes/uploadify/uploadify.php
https://citrix.visma.com//wp-content/themes/konzept/includes/uploadify/uploadify.php
# [!] File Location : C99 Shell URL
https://citrix.visma.com//wp-content/themes/konzept/includes/uploadify/uploads/c99_locus7s.php
https://citrix.visma.com//wp-content/themes/konzept/includes/uploadify/uploads/c99_locus7s.php
Day 1 :- After reporting this to site got their reply in 5 min. :p
Thank you for your report we have passed to your IT team for fixing it ASAP
and Vulnerability is fixed within 2 Hours.
Thank you for your report we have passed to your IT team for fixing it ASAP
and Vulnerability is fixed within 2 Hours.
Day 2 :- The hole has now been patched and the shell is removed, but it will probably require some more time to go through the server before declaring it properly secured again.π
Day 3 :- discussing with their management department for cash reward. π€¨
Day 4 & 5 :- No reply π
Day 6 :- Thank you for your patience in this matter. I’m happy to tell you that we have awarded you a bounty of $4000 USD for this finding.. π€
Hope You liked this finding and i apologize for my weak English if there is any mistakes in this post.
Thanks for reading my article, have a great day . π
Comments
Post a Comment