#!/usr/bin/python #-*- coding: iso-8859-15 -*- ''' _ _ _ | |_| |_ ___ _ _ __ __ _ _ _ __ _ __| |_____ __ | _| ' \/ -_)|_|| '_ \/ _` | '_/ _` / _` / _ \ \ / \__|_||_\___||_|| .__/\__,_|_| \__,_\__,_\___/_\_\ |_| ------------------------------------------------------------------------------------------------ This is a Public Exploit. 22/11/2007 (dd-mm-yyyy) ------------------------------------------------------------------------------------------------ § 0day VigileCMS <= 1.8 Stealth - Remote Command Execution § Vendor: http://www.vigilenapoletano.it Severity: Highest Author: The:Paradox Italy r0x. Visit inj3ct-it.org Comments: This exploit was coded to show some people what a real vulnerability is. ------------------------------------------------------------------------------------------------ Related Codes: --- index.php; line 64: if (isset($_COOKIE[rem_user]) and isset ($_COOKIE[rem_pass]) and !isset($_SESSION[user])) { if(file_exists(USERS_TAB."/$_COOKIE[rem_user].$_COOKIE[rem_pass].php")){ $_SESSION[user] = $_COOKIE[rem_user]; $_SESSION[pass] = $_COOKIE[rem_pass]; logthis("$_SESSION[user] si è collegato al Sito: riconosciuto con Cookie!"); UserVisita ();// aggiornamento database utente per numero di visite } } --- func.inc.php; line 93: function is_admin(){ //## FUNCTION ## if( (isset($_SESSION[user]) and isset($_SESSION[pass])) && (file_exists(ADMIN_TAB."/$_SESSION[user].$_SESSION[pass].php")) ){ return true; } else { return false; } } --- func.inc.php; line 109: function is_superadmin(){ //## FUNCTION ## include (LOGS_TAB."/creazione.php"); if (isset($_SESSION["user"]) and isset($_SESSION["pass"]) and ($_SESSION[user]==$primo_amministra)) { return true; } else { return false; } } --- vedipm.php; line 210: if ($_POST[ttl] =="") $_POST[ttl]="Nessun oggetto"; $_POST[ttl] =stripslashes($_POST[ttl]); $_POST[ttl] =htmlspecialchars($_POST[ttl]); // impedisce visualizzazioni caratteri html e