Wayne, Please read comments inline,
On Fri, Dec 30, 2011 at 6:59 PM, Wayne Dawson <wayne_daw...@inventuresolutions.com> wrote: > I was using w3af on a samurai CD ( which is Ubuntu 9.04), but had updated it > to current SVN version). Note that /usr/bin/python is linked to python2.6, > and python -V reports “Python 2.6.2”. Ok, setup seems correct then > After updating w3af, to get it to work, I had to follow the instructions > provided in the tools std err. It involved downloading and installing > PyYAML-3.0.9, Nltk, Python-dev, and some python filter library that I can’t > remember now. mmap bloom filter :) That all sounds correct, > I used this against a machine running a purposely vulnerable app. One of > the vulnerabilities is osCommanding, in the commandinj.php page: > > <?php > > Passthru($_GET[command]); > > ?> > > > > This was found and reported (via the plugin’s ping test). > > > > Going to the exploit tab, selecting osCommandingShell > Exploit All To First > success. I tried to interact with the shell, no output was given in > response to my commands. > > > > > > The saved results were this: > > > www-data@sec542> id > www-data@sec542> who > www-data@sec542> uname -a Hmmm.... sorry about that, I'll return an error message when the command does not exist. You should use "e id" or "e who" instead of "id" or "who". This changed around 6 months ago. > > However, I could exploit it manually, by typing in the browser url bar, > typing > > https://www.sec542.org/scanners/commandinj.php?command=id > > This gets the expected output (returned in the browser window): > > uid=33(www-data) gid=33(www-data) groups=33(www-data) > > > > At least last night, a shell was created. When I repeated the test today, I > found the shell didn’t even get created, even though it found the > vulnerability, and I could still manually get the results. > > GET https://www.sec542.org/scanners/commandinj.php?command=/bin/echo > TqLUCesg returned HTTP code "200" - id: 245 > > Defined cut header and footer using exact match > > Defined header length to 0 > > Defined footer length to 0 > > POST https://www.sec542.org/scanners/commandinj.php with data: > "command=/bin/echo ynyRYKuK" returned HTTP code "200" - id: 246 > > The vulnerability was found using method GET, tried to change the method to > POST for exploiting but failed. > > > > I don’t see any errors that would explain the shell not getting created > here. > > > > I looked for bug reports by searching for “shell” but found only old ones. > Ditto for searching for osCommanding. I was running. It might be > something with the old samurai machine, but it didn’t happen prior to > updating to the new version (Version 1.2, Rev 4610). > > > > Any ideas? > > > ________________________________ > This email and any files transmitted with it are confidential and intended > solely for the use of the individual to whom they are addressed. If you have > received this email in error, please delete this email from your system. > > ------------------------------------------------------------------------------ > Ridiculously easy VDI. With Citrix VDI-in-a-Box, you don't need a complex > infrastructure or vast IT resources to deliver seamless, secure access to > virtual desktops. With this all-in-one solution, easily deploy virtual > desktops for less than the cost of PCs and save 60% on VDI infrastructure > costs. Try it free! http://p.sf.net/sfu/Citrix-VDIinabox > _______________________________________________ > W3af-users mailing list > W3af-users@lists.sourceforge.net > https://lists.sourceforge.net/lists/listinfo/w3af-users > -- Andrés Riancho Director of Web Security at Rapid7 LLC Founder at Bonsai Information Security Project Leader at w3af ------------------------------------------------------------------------------ Ridiculously easy VDI. With Citrix VDI-in-a-Box, you don't need a complex infrastructure or vast IT resources to deliver seamless, secure access to virtual desktops. With this all-in-one solution, easily deploy virtual desktops for less than the cost of PCs and save 60% on VDI infrastructure costs. Try it free! http://p.sf.net/sfu/Citrix-VDIinabox _______________________________________________ W3af-users mailing list W3af-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/w3af-users