Product

Please sign in

You must be logged in to add items to your cart.

Loading...

Exploit for OSVDB-75095 | LotusCMS 3.0
Description

This is an exploit for the eval() injection vulnerability found ages ago in LotusCMS. Very quick and dirty exploit, written to test out some new ideas I had for writing more streamlined PHP RCE exploits, in this case, using the cookie to set the connectback host/port at runtime when doing a filedropper type thing. I ended up storing the payload itself in a POST variable, as storing it in the cookie lead to some strange encoding issues. See the code for what I mean. The reason for writing this was to have a reliable "playground" in which to test ideas, and it is going to probably be an evolving piece of work.

Price: $5.00 |
Escrow: Yes
|

Replies

Confirm Deletion

Are you sure you want to delete this reply? This action cannot be undone.

There are no replies yet. Be the first to reply.