Home / exploits w-CMS 2.0.1 Remote Code Execution
Posted on 16 August 2013
Exploit Title: w-CMS 2.0.1 Remote Code Execution Vulnerability Google Dork: intext:"Powered by w-CMS" Date: 15/08/2013 Exploit Author: ICheer_No0M - http://icheernoom.blogspot.com/ Vendor Homepage: http://w-cms.org/ Software Link: - Version: 2.0.1 Tested on: Windows 7 + PHP 5.2.6 ---> Vuln Code : /userFunctions.php 6. switch($_REQUEST['udef']) // user defined function ... 11. case 'activity': procActivity(); // <-- call procActivity Function ... 254. function procActivity() 255. { 256. $type = $_REQUEST['type']; // <-- type 257. $content = $_REQUEST['content']; // <-- content 258. $content = preg_replace("/|/","
