|
|
|
|
Menu |
|
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
|
User Info |
|
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 150
Members: 0
Total: 150
|
|
|
|
|
|
Full disclosure |
|
|
|
|
|
|
|
|
|
IT Security and Insecurity Portal |
|
|
php shell -> root |
|
Posted: Wed Jun 13, 2007 8:11 pm |
|
|
drag |
Active user |
|
|
Joined: May 31, 2007 |
Posts: 25 |
|
|
|
|
|
|
|
Is it possible to run local exploits within the r57 or c99 shell to escalate priveleges? Or do you need to be using an actual shell on the system? |
|
|
|
|
|
Re: php shell -> root |
|
Posted: Fri Jun 15, 2007 9:47 am |
|
|
ToXiC |
Moderator |
|
|
Joined: Dec 01, 2004 |
Posts: 181 |
Location: Cyprus |
|
|
|
|
|
|
drag wrote: | Is it possible to run local exploits within the r57 or c99 shell to escalate priveleges? Or do you need to be using an actual shell on the system? |
with php shells you have limited access to work only on tmp folders or on folders/files that are public.
To move futher on you need a binder (if you are able to install one) .. So to successfully compromise a system with c99 or r57 the system itself should be really stupitly configured.
but still .. maybe the system is patched and configured correctly .. but users that are on it leave the configuration.php or config.php or admin.php files on 777 r/w/e permition so everybody is able to read them ..
and if you move one step futher.. you can do something like this..
cat /etc/passwd
you got all the users on the site .. then write a small script that the only thing will do is.
cat /home/user1/configuration.php >> out.txt
cat /home/user2/configuration.php >> out.txt
cat /home/user3/configuration.php >> out.txt
cat /home/user1/config.php >> out.txt
cat /home/user2/config.php >> out.txt
cat /home/user3/config.php >> out.txt
(imagine having a server with more thatn 1000 sites on it.. NOT ALL THE USERS REMOVE 777 permition on those files)
after that download out.txt file and see what inside
most probably a lot configuration files and a lot database names user/pass
.... then with c99 you can connect to the database and edit/or view the hash value of the admin..
.......( Then of course you call the owner of the site and you inform him to change the permitions )
Now ... With statistical results.. 3 out of 10 users use same password to cpanel/ssh/admin section of their web application (joomla/phpnuke/e107/etc etc)
Then is more likely to have an ssh password and if you want you can compromise the whole system easier with local exploits...
This is just a thought.. Its easier to exploit a users stupidity than a server's bug
ToXiC |
|
_________________ who|grep -i blonde|talk; cd~;wine;talk;touch;unzip;touch; strip;gasp;finger;gasp;mount; fsck; more; yes; gasp; umount; make clean; sleep;wakeup;goto http://www.md5this.com |
|
|
|
|
|
|
|
Posted: Sat Jun 16, 2007 9:04 am |
|
|
pexli |
Valuable expert |
|
|
Joined: May 24, 2007 |
Posts: 665 |
Location: Bulgaria |
|
|
|
|
|
|
ToXiC no need 777 perms on files to read him,604 enough to read this files witn owner nobody. |
|
|
|
|
Posted: Sat Jun 16, 2007 12:55 pm |
|
|
ToXiC |
Moderator |
|
|
Joined: Dec 01, 2004 |
Posts: 181 |
Location: Cyprus |
|
|
|
|
|
|
koko wrote: | ToXiC no need 777 perms on files to read him,604 enough to read this files witn owner nobody. |
yes i was giving just an example.. |
|
_________________ who|grep -i blonde|talk; cd~;wine;talk;touch;unzip;touch; strip;gasp;finger;gasp;mount; fsck; more; yes; gasp; umount; make clean; sleep;wakeup;goto http://www.md5this.com |
|
|
|
www.waraxe.us Forum Index -> Remote file inclusion
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
All times are GMT
Page 1 of 1
|
|
|
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|