Short Post – Smart 0day Hunting

Ok, so I had to notice the “Sammy FORGIT” guy dropping exploits all over Packetstorm and Exploit-DB lately. Most of them in WordPress plugins. You can check out the shit he is dropping here – http://packetstormsecurity.org/files/author/9818/

So, I had to take a look to see could I notice any “trick” he was using to find ALL THOSE VULNZ! I want the 0day too!

Lets look at two of the exploits as an example – if you look more there IS a discernable pattern,, I promise you.

http://packetstormsecurity.org/files/113844/WordPress-LB-Mixed-Slideshow-1.0-Shell-Upload.html

http://packetstormsecurity.org/files/113898/e107-Hupsi-Fancybox-1.0.4-Shell-Upload.html

Now, what part of both of those is the vuln in?
/uploader/uploadify.php
/uploadify/upload.php
Now, is this just me, or are both using the Uploadify library?
Could be a coincidence, but I must look deeper! I must find MORE examples of this!

This file explains it:

http://packetstormsecurity.org/files/113576/WordPress-plugin-Foxypress-uploadify.php-Arbitrary-Code-Execution.html

So it is the “uploadify.php” file that is buggy as hell. Lets find more examples of this!

http://packetstormsecurity.org/files/113568/WordPress-Auctions-2.0.1.3-Shell-Upload.html

-> It has “vuln path” of uploadify/upload.php

http://packetstormsecurity.org/files/113283/WordPress-Foxypress-Shell-Upload.html

-> Has “vuln path” uploadify/uploadify.php

http://packetstormsecurity.org/files/113277/WordPress-HTML5-AV-Manager-0.2.7-Shell-Upload.html

-> Has “vuln path” uploadify/custom.php

http://packetstormsecurity.org/files/113274/WordPress-WP-Property-1.35.0-Shell-Upload.html

-> Has “vuln path” uploadify/uploadify.php

So, as you can see, all these use the “Uploadify” PHP library to handle file uploads. This library is the vulnerability that makes ALL these plugins buggy.
ANY software using a vulnerable library like that, is vulnerable to this bug.

So what does this all mean? Well, if you want the 0day to flood in, you should do as Sammy does. Look for libraries a lot of things use, and find vulns in THEM. The product may be secure, but its libraries are likely not. This way, you canhaz ALL the 0day you ever needed.

Now, excuse me while I SVN checkout the entire repo of WordPress plugins :P

2 thoughts on “Short Post – Smart 0day Hunting

  1. Pingback: WordPress-Modul Uploadify als Einfallstor | virtualfiles.net

  2. Hi bro,
    What a coincidence , I also spend a day searching for 0 day on that day and noticed sammy’s discovered vulns in WP.
    My website is now offline I’ll back soon …
    Best wishes
    h0m1x

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>