Exploit MySQL 4.x/5.0 (Windows) - User-Defined Function Command Execution

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
3274
Проверка EDB
  1. Пройдено
Автор
MARCO IVALDI
Тип уязвимости
REMOTE
Платформа
WINDOWS
CVE
N/A
Дата публикации
2007-02-06
Код:
-- raptor_winudf.sql - A MySQL UDF backdoor kit for Windows
-- Copyright (c) 2007 Marco Ivaldi <[email protected]>
--
-- This is a MySQL backdoor kit for Windows based on the UDFs (User Defined
-- Functions) mechanism. Use it to spawn a reverse shell (netcat UDF on port 
-- 80/tcp) or to execute single OS commands (exec UDF). Don't forget to edit
-- the MySQL bin path below according to your target's configuration.
--
-- Thanks to KDM for asking me to do research on this interesting subject!
--
-- See also:
-- http://www.0xdeadbeef.info/exploits/raptor_udf.c
-- http://www.0xdeadbeef.info/exploits/raptor_udf2.c
--
-- Tested on:
-- MySQL 4.0.18-win32 (running on Windows XP SP2)
-- MySQL 4.1.22-win32 (running on Windows XP SP2)
-- MySQL 5.0.27-win32 (running on Windows XP SP2)
--
-- E-DB Note: Keep an eye on https://github.com/mysqludf/lib_mysqludf_sys

download:
http://www.0xdeadbeef.info/exploits/raptor_winudf.tgz
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/3274.tgz (02062007-raptor_winudf.tgz)

# milw0rm.com [2007-02-06]
 
Источник
www.exploit-db.com

Похожие темы