Welcome to World of IPTV

With

+23k members
+11k threads
+106k posts

we are the most popular IPTV community on the web. 

IMPORTANT NOTE:
WE HAVE RECENTLY NOTICED THAT TOO MANY DOUBLE FAKE ACCOUNTS ARE CREATED IN THE PAST.
TO PREVENT THIS ISSUE THE DECISION WAS MADE THAT IN THE FUTURE A ANNUALLY FEE 20 EURO WILL BE RAISED FOR NEW MEMBERSHIPS.

Join now to the World of IPTV

Forum Rules

Before you start, check out the forum rules first

Account upgrade

Upgrade your account to get access to full features

Advertising

Would you like to place your advertisement with us ?

Resources Manager

Hundreds of IPTV scripts and apps are available for download

Info IPTV Smarters Exploit: CVE-2020–9380

Cobrahosts

Basic Member
Basic Member
Banned
Joined
Oct 2, 2019
Messages
158
Reaction score
652
Points
104
Location
UK
Check the forum rules,
A member since November with 30 likes just needs to FOLLOW the forums rules and the like will appear.......... asking for them..... I sense a hammer coming
 
Last edited by a moderator:

AndersonPablo

Extended Member
Ext. Member
Joined
Mar 11, 2020
Messages
3
Reaction score
1
Points
11
Location
US
Channels MatchTime Unblock CDN Offshore Server Contact
100 cnx / 90€ 5Gbps / 180€ 48CPU-256GRAM 10Gbps 569€ Skype live:giefsl
500 cnx / 350€ 10Gbps / 350€ 48CPU-128GRAM 5Gbps / 349€ TG @changglobize
1000 cnx / 500€ 20Gbps / 700€ 40CPU-128GRAM 20Gbps / €980 http://coronaserver.com

evoactivity

Extended Member
Ext. Member
Joined
Jan 18, 2020
Messages
72
Reaction score
712
Points
94
Location
Liverpool
The absolute state of this code

PHP:
session_start();
if (file_exists("functions.php")) {
    include_once "functions.php";
    if (isset($_FILES["logoImage"])) {
        $target_dir = "../images/";
        $target_file = $target_dir . basename($_FILES["logoImage"]["name"]);
        if (move_uploaded_file($_FILES["logoImage"]["tmp_name"], $target_file)) {
            echo "images/" . $_FILES["logoImage"]["name"];
            exit;
        }
        echo "errorImage";
        exit;
    }
...

This will have been 0dayed for a long time, the quality of development is so so bad with iptv. That will accept any file from anyone. Ridiculous.
 

AndersonPablo

Extended Member
Ext. Member
Joined
Mar 11, 2020
Messages
3
Reaction score
1
Points
11
Location
US
The absolute state of this code

PHP:
session_start();
if (file_exists("functions.php")) {
    include_once "functions.php";
    if (isset($_FILES["logoImage"])) {
        $target_dir = "../images/";
        $target_file = $target_dir . basename($_FILES["logoImage"]["name"]);
        if (move_uploaded_file($_FILES["logoImage"]["tmp_name"], $target_file)) {
            echo "images/" . $_FILES["logoImage"]["name"];
            exit;
        }
        echo "errorImage";
        exit;
    }
...

This will have been 0dayed for a long time, the quality of development is so so bad with iptv. That will accept any file from anyone. Ridiculous.
Certainly! my friend. Those responsible for the smarters contacted me and informed that it is one without many problems. They don't really know anything.
 

evoactivity

Extended Member
Ext. Member
Joined
Jan 18, 2020
Messages
72
Reaction score
712
Points
94
Location
Liverpool
Certainly! my friend. Those responsible for the smarters contacted me and informed that it is one without many problems. They don't really know anything.

Ahh, the man himself. Nice job on the exploit, good to see it properly reported as CVE. Hopefully smarters will do something now it's getting picked up in the tech news.
 
Channels MatchTime Unblock CDN Offshore Server Contact
100 cnx / 90€ 5Gbps / 180€ 48CPU-256GRAM 10Gbps 569€ Skype live:giefsl
500 cnx / 350€ 10Gbps / 350€ 48CPU-128GRAM 5Gbps / 349€ TG @changglobize
1000 cnx / 500€ 20Gbps / 700€ 40CPU-128GRAM 20Gbps / €980 http://coronaserver.com
Channels MatchTime Unblock CDN Offshore Server Contact
100 cnx / 90€ 5Gbps / 180€ 48CPU-256GRAM 10Gbps 569€ Skype live:giefsl
500 cnx / 350€ 10Gbps / 350€ 48CPU-128GRAM 5Gbps / 349€ TG @changglobize
1000 cnx / 500€ 20Gbps / 700€ 40CPU-128GRAM 20Gbps / €980 http://coronaserver.com

migueltarga

Extended Member
Ext. Member
Joined
Oct 20, 2019
Messages
4
Reaction score
83
Points
21
Location
Leominster, MA
How can we be sure that this patch is safe to use?
As you joined the forum 6 months ago
and only have 1 post which is this patch

Hi Mobilehacks,

6 months of forum, but the creator of the CVE and the exploit.
10 years in google hall of fame for security:
You don't have to trust me if you don't want to, the patch source is open.

But I think I'm the wrong person to have questions about, I would personally rather question the IPTV Smarters quality.
 

Mobilehacks

Extended Member
Ext. Member
Joined
Nov 3, 2019
Messages
122
Reaction score
216
Points
54
Location
Somewhere Your Not
Hi Mobilehacks,

You don't have to trust me if you don't want to, the patch source is open.

But I think I'm the wrong person to have questions about, I would personally rather question the IPTV Smarters quality.
Nothing personal intended i was purely just asking a question
 
J

JoAodeDeUs

Guest
It is not new that IPTV Smarters does not expire confidence. At least for me ...
Now it has only been exposed in the media.
 
Channels MatchTime Unblock CDN Offshore Server Contact
100 cnx / 90€ 5Gbps / 180€ 48CPU-256GRAM 10Gbps 569€ Skype live:giefsl
500 cnx / 350€ 10Gbps / 350€ 48CPU-128GRAM 5Gbps / 349€ TG @changglobize
1000 cnx / 500€ 20Gbps / 700€ 40CPU-128GRAM 20Gbps / €980 http://coronaserver.com

FireTvGuru

Extended Member
Ext. Member
Joined
Sep 11, 2019
Messages
217
Reaction score
2,829
Points
104
Location
USA
This would be a good solution instead of removing the snips, if not please correct if im wrong.

PHP:
<?php
    //Vulnerability 1: Arbitrary File Upload
    
    if (isset($_FILES["logoImage"])) {
        //added to check file extentions
        $file_ext=pathinfo($_FILES['logoImage']['name']);
        $extensions= array("jpeg","jpg","png","JPEG","JPG","PNG");
        if(in_array($file_ext,$extensions)=== false){echo 'Not a valid file ext.';die("Error")}
        //end of check
        $target_dir = "../images/";
        $target_file = $target_dir . basename($_FILES["logoImage"]["name"]);
        if (move_uploaded_file($_FILES["logoImage"]["tmp_name"], $target_file)) {
            echo "images/" . $_FILES["logoImage"]["name"];
            exit;
        }
        echo "errorImage";
        exit;
    }

    //Vulnerability 2: Code Injection
    
    if (isset($_POST["action"]) && $_POST["action"] == "installation") {
        //check to see if form data came from same REFERER
        if ((isset($_SERVER['HTTP_REFERER']) && !empty($_SERVER['HTTP_REFERER']))) {
            if (strtolower(parse_url($_SERVER['HTTP_REFERER'], PHP_URL_HOST)) != strtolower($_SERVER['HTTP_HOST'])) {
            die("Error")
            }
        }
        //end check
        $response["result"] = "no";
        $content = "<?php \n";
        $content .= "\$XCStreamHostUrl = \"" . $_POST["HostUrlVal"] . "\";" . "\n";
        $content .= "\$XClogoLinkval = \"" . $_POST["logoLinkval"] . "\";" . "\n";
        $content .= "\$XCcopyrighttextval = \"" . $_POST["copyrighttextval"] . "\";" . "\n";
        $content .= "\$XCcontactUslinkval = \"" . $_POST["contactUslinkval"] . "\";" . "\n";
        $content .= "\$XChelpLinkval = \"" . $_POST["helpLinkval"] . "\";" . "\n";
        $content .= "\$XClicenseIsval = \"" . $_POST["licenseIsval"] . "\";" . "\n";
        $content .= "\$XClocalKey = \"" . $_POST["LocalKey"] . "\";" . "\n";
        $content .= "\$XCsitetitleval = \"" . $_POST["sitetitleval"] . "\";" . "\n";
        $content .= "?>";
        if (file_exists("../configuration.php")) {
            unlink("../configuration.php");
        }
        $fp = fopen("../configuration.php", "w");
        fwrite($fp, $content);
        fclose($fp);
        chmod("../configuration.php", 511);
        if (file_exists("../configuration.php")) {
            $response["result"] = "yes";
        }
        echo json_encode($response);
        exit;
    }
?>
 

migueltarga

Extended Member
Ext. Member
Joined
Oct 20, 2019
Messages
4
Reaction score
83
Points
21
Location
Leominster, MA
This would be a good solution instead of removing the snips, if not please correct if im wrong.

PHP:
<?php
    //Vulnerability 1: Arbitrary File Upload
   
    if (isset($_FILES["logoImage"])) {
        //added to check file extentions
        $file_ext=pathinfo($_FILES['logoImage']['name']);
        $extensions= array("jpeg","jpg","png","JPEG","JPG","PNG");
        if(in_array($file_ext,$extensions)=== false){echo 'Not a valid file ext.';die("Error")}
        //end of check
        $target_dir = "../images/";
        $target_file = $target_dir . basename($_FILES["logoImage"]["name"]);
        if (move_uploaded_file($_FILES["logoImage"]["tmp_name"], $target_file)) {
            echo "images/" . $_FILES["logoImage"]["name"];
            exit;
        }
        echo "errorImage";
        exit;
    }

    //Vulnerability 2: Code Injection
   
    if (isset($_POST["action"]) && $_POST["action"] == "installation") {
        //check to see if form data came from same REFERER
        if ((isset($_SERVER['HTTP_REFERER']) && !empty($_SERVER['HTTP_REFERER']))) {
            if (strtolower(parse_url($_SERVER['HTTP_REFERER'], PHP_URL_HOST)) != strtolower($_SERVER['HTTP_HOST'])) {
            die("Error")
            }
        }
        //end check
        $response["result"] = "no";
        $content = "<?php \n";
        $content .= "\$XCStreamHostUrl = \"" . $_POST["HostUrlVal"] . "\";" . "\n";
        $content .= "\$XClogoLinkval = \"" . $_POST["logoLinkval"] . "\";" . "\n";
        $content .= "\$XCcopyrighttextval = \"" . $_POST["copyrighttextval"] . "\";" . "\n";
        $content .= "\$XCcontactUslinkval = \"" . $_POST["contactUslinkval"] . "\";" . "\n";
        $content .= "\$XChelpLinkval = \"" . $_POST["helpLinkval"] . "\";" . "\n";
        $content .= "\$XClicenseIsval = \"" . $_POST["licenseIsval"] . "\";" . "\n";
        $content .= "\$XClocalKey = \"" . $_POST["LocalKey"] . "\";" . "\n";
        $content .= "\$XCsitetitleval = \"" . $_POST["sitetitleval"] . "\";" . "\n";
        $content .= "?>";
        if (file_exists("../configuration.php")) {
            unlink("../configuration.php");
        }
        $fp = fopen("../configuration.php", "w");
        fwrite($fp, $content);
        fclose($fp);
        chmod("../configuration.php", 511);
        if (file_exists("../configuration.php")) {
            $response["result"] = "yes";
        }
        echo json_encode($response);
        exit;
    }
?>


FireTvGuru The file Upload code is good, that's a perfect solution.

But the second one, it will be easy to be exploited, because anyone can spoof the Referer. The best solution would be having an installation script that gets removed after executed.
 
Channels MatchTime Unblock CDN Offshore Server Contact
100 cnx / 90€ 5Gbps / 180€ 48CPU-256GRAM 10Gbps 569€ Skype live:giefsl
500 cnx / 350€ 10Gbps / 350€ 48CPU-128GRAM 5Gbps / 349€ TG @changglobize
1000 cnx / 500€ 20Gbps / 700€ 40CPU-128GRAM 20Gbps / €980 http://coronaserver.com
shape1
shape2
shape3
shape4
shape5
shape6
Top
AdBlock Detected

We know, ad-blocking software do a great job at blocking ads. But our site is sponsored by advertising. 

For the best possible site experience please take a moment to disable your AdBlocker.
You can create a Account with us or if you already have account, you can prefer an Account Upgrade.

I've Disabled AdBlock