Advertisement






Gigaland NFT Marketplace 1.9 Shell Upload / Key Disclosure

CVE Category Price Severity
CVE-2021-12345 CWE-434 $500 Critical
Author Risk Exploitation Type Date
Anonymous High Remote 2022-08-15
CVSS EPSS EPSSP
CVSS:4.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2022080052

Below is a copy:

Gigaland NFT Marketplace 1.9 Shell Upload / Key Disclosure
# Exploit Title: Gigaland NFT marketplace Shell upload and ETH private key leak 
# Google Dork: N/A
# Date: 14/8/2022
# Exploit Author: Sohel Yousef   https://www.linkedin.com/in/sohel-yousef-50a905189/
# Software Link: https://gigaland.io/
# Version: 1.9
# Category: webapps

1. Sell Upload 

after connectiong your wallet to the site go to edit profile section 
on the link
localhost/artist/account
upload your shell in php format with no secuirty 
your shell well be in this direction
storage/artist/profile/ ++ you can Inspect Element the edit profile page to have the direct link 

2. Private key leak 

this link 

localhost//resources/privateJs/transfer.js

have the private key for the ethereum account 

const addressFrom = receiverAddress;
const privKey = '9f09d101c +++  HIDDEN ++++++ ac7bea0db0c25d2b5a3'

async function transfer(addressto, data, history_id) {

    debugger;
    const web3js = new Web3(rpcURL);

    const contract = new web3js.eth.Contract(trabi, trcontractAddress, {});

    const nonce = await web3js.eth.getTransactionCount(addressFrom, 'latest'); //get latest nonce

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum