Wayne,

On Mon, Jan 2, 2012 at 2:26 PM, Andres Riancho <andres.rian...@gmail.com> wrote:
> Wayne,
>
>    Please read comments inline,
>
> On Fri, Dec 30, 2011 at 6:59 PM, Wayne Dawson
> <wayne_daw...@inventuresolutions.com> wrote:
>> I was using w3af on a samurai CD ( which is Ubuntu 9.04), but had updated it
>> to current SVN version).  Note that /usr/bin/python is linked to python2.6,
>>  and python -V reports “Python 2.6.2”.
>
>    Ok, setup seems correct then
>
>> After updating w3af, to get it to work, I had to follow the instructions
>> provided in the tools std err.  It involved downloading and installing
>> PyYAML-3.0.9, Nltk, Python-dev, and some python filter library that I can’t
>> remember now.
>
>    mmap bloom filter :) That all sounds correct,
>
>> I used this against a machine running a purposely vulnerable app.   One of
>> the vulnerabilities is osCommanding, in the commandinj.php page:
>>
>> <?php
>>
>> Passthru($_GET[command]);
>>
>> ?>
>>
>>
>>
>> This was found and reported (via the plugin’s ping test).
>>
>>
>>
>> Going to the exploit tab, selecting osCommandingShell > Exploit All To First
>> success.   I tried to interact with the shell, no output was given in
>> response to my commands.
>>
>>
>>
>>
>>
>> The saved results were this:
>>
>>
>> www-data@sec542> id
>> www-data@sec542> who
>> www-data@sec542> uname -a
>
>    Hmmm.... sorry about that, I'll return an error message when the
> command does not exist. You should use "e id" or "e who" instead of
> "id" or "who". This changed around 6 months ago.

    Modified ! Here's your change :)
    http://sourceforge.net/apps/trac/w3af/changeset/4613

>>
>> However, I could exploit it manually, by typing in the browser url bar,
>> typing
>>
>> https://www.sec542.org/scanners/commandinj.php?command=id
>>
>> This  gets the expected output (returned in the browser window):
>>
>> uid=33(www-data) gid=33(www-data) groups=33(www-data)
>>
>>
>>
>> At least last night, a shell was created.  When I repeated the test today, I
>> found the shell didn’t even get created, even though it found the
>> vulnerability, and I could still manually get the results.
>>
>> GET https://www.sec542.org/scanners/commandinj.php?command=/bin/echo
>> TqLUCesg returned HTTP code "200" - id: 245
>>
>> Defined cut header and footer using exact match
>>
>> Defined header length to 0
>>
>> Defined footer length to 0
>>
>> POST https://www.sec542.org/scanners/commandinj.php with data:
>> "command=/bin/echo ynyRYKuK" returned HTTP code "200" - id: 246
>>
>> The vulnerability was found using method GET, tried to change the method to
>> POST for exploiting but failed.
>>
>>
>>
>> I don’t see any errors that would explain the shell not getting created
>> here.
>>
>>
>>
>> I looked for bug reports by searching for “shell” but found only old ones.
>> Ditto for searching for osCommanding.  I was running.   It might be
>> something with the old samurai machine, but it didn’t happen prior to
>> updating to the new version (Version 1.2, Rev 4610).
>>
>>
>>
>> Any ideas?
>>
>>
>> ________________________________
>> This email and any files transmitted with it are confidential and intended
>> solely for the use of the individual to whom they are addressed. If you have
>> received this email in error, please delete this email from your system.
>>
>> ------------------------------------------------------------------------------
>> Ridiculously easy VDI. With Citrix VDI-in-a-Box, you don't need a complex
>> infrastructure or vast IT resources to deliver seamless, secure access to
>> virtual desktops. With this all-in-one solution, easily deploy virtual
>> desktops for less than the cost of PCs and save 60% on VDI infrastructure
>> costs. Try it free! http://p.sf.net/sfu/Citrix-VDIinabox
>> _______________________________________________
>> W3af-users mailing list
>> W3af-users@lists.sourceforge.net
>> https://lists.sourceforge.net/lists/listinfo/w3af-users
>>
>
>
>
> --
> Andrés Riancho
> Director of Web Security at Rapid7 LLC
> Founder at Bonsai Information Security
> Project Leader at w3af



-- 
Andrés Riancho
Director of Web Security at Rapid7 LLC
Founder at Bonsai Information Security
Project Leader at w3af

------------------------------------------------------------------------------
Ridiculously easy VDI. With Citrix VDI-in-a-Box, you don't need a complex
infrastructure or vast IT resources to deliver seamless, secure access to
virtual desktops. With this all-in-one solution, easily deploy virtual 
desktops for less than the cost of PCs and save 60% on VDI infrastructure 
costs. Try it free! http://p.sf.net/sfu/Citrix-VDIinabox
_______________________________________________
W3af-users mailing list
W3af-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/w3af-users

Reply via email to