I was using w3af on a samurai CD ( which is Ubuntu 9.04), but had updated it to
current SVN version). Note that /usr/bin/python is linked to python2.6, and
python -V reports "Python 2.6.2".
After updating w3af, to get it to work, I had to follow the instructions
provided in the tools std err. It involved downloading and installing
PyYAML-3.0.9, Nltk, Python-dev, and some python filter library that I can't
remember now.
I used this against a machine running a purposely vulnerable app. One of the
vulnerabilities is osCommanding, in the commandinj.php page:
<?php
Passthru($_GET[command]);
?>
This was found and reported (via the plugin's ping test).
Going to the exploit tab, selecting osCommandingShell > Exploit All To First
success. I tried to interact with the shell, no output was given in response
to my commands.
The saved results were this:
www-data@sec542> id
www-data@sec542> who
www-data@sec542> uname -a
www-data@sec542>
However, I could exploit it manually, by typing in the browser url bar, typing
https://www.sec542.org/scanners/commandinj.php?command=id
This gets the expected output (returned in the browser window):
uid=33(www-data) gid=33(www-data) groups=33(www-data)
At least last night, a shell was created. When I repeated the test today, I
found the shell didn't even get created, even though it found the
vulnerability, and I could still manually get the results.
GET https://www.sec542.org/scanners/commandinj.php?command=/bin/echo TqLUCesg
returned HTTP code "200" - id: 245
Defined cut header and footer using exact match
Defined header length to 0
Defined footer length to 0
POST https://www.sec542.org/scanners/commandinj.php with data:
"command=/bin/echo ynyRYKuK" returned HTTP code "200" - id: 246
The vulnerability was found using method GET, tried to change the method to
POST for exploiting but failed.
I don't see any errors that would explain the shell not getting created here.
I looked for bug reports by searching for "shell" but found only old ones.
Ditto for searching for osCommanding. I was running. It might be something
with the old samurai machine, but it didn't happen prior to updating to the new
version (Version 1.2, Rev 4610).
Any ideas?
________________________________
This email and any files transmitted with it are confidential and intended
solely for the use of the individual to whom they are addressed. If you have
received this email in error, please delete this email from your system.
------------------------------------------------------------------------------
Ridiculously easy VDI. With Citrix VDI-in-a-Box, you don't need a complex
infrastructure or vast IT resources to deliver seamless, secure access to
virtual desktops. With this all-in-one solution, easily deploy virtual
desktops for less than the cost of PCs and save 60% on VDI infrastructure
costs. Try it free! http://p.sf.net/sfu/Citrix-VDIinabox
_______________________________________________
W3af-users mailing list
W3af-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/w3af-users